Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

Snow 2.0 IP core for trusted hardware

Fang, Wen Hai LU ; Johansson, Thomas LU orcid and Spaanenburg, Lambert LU (2005) 2005 International Conference on Field Programmable Logic and Applications (FPL) 2005. p.281-286
Abstract
Stream ciphers like Snow 2.0 are very promising techniques for encryption in trusted hardware, but demand specialized IP cores to enhance conventional architectures. The paper describes the design of such a core that can be adapted to the system needs according to a ratio of throughput and effective slice usage of 3.2 to 3.5. The footprint is comparable with a commercial floating-point unit.
Please use this url to cite or link to this publication:
author
; and
organization
publishing date
type
Chapter in Book/Report/Conference proceeding
publication status
published
subject
keywords
Behavioral Synthesis, Trusted Hardware, ISA-compliant IP-core, Stream cipher encryption, Pareto curve
host publication
Proceedings - 2005 International Conference on Field Programmable Logic and Applications, FPL
volume
2005
pages
281 - 286
publisher
IEEE - Institute of Electrical and Electronics Engineers Inc.
conference name
2005 International Conference on Field Programmable Logic and Applications (FPL)
conference location
Tampere, Finland
conference dates
2005-08-24 - 2005-08-26
external identifiers
  • scopus:33746933258
DOI
10.1109/FPL.2005.1515735
language
English
LU publication?
yes
id
99e9fc4a-362c-4cf9-9f2a-748b435ba0dd (old id 616438)
date added to LUP
2016-04-04 11:29:55
date last changed
2023-09-20 11:11:09
@inproceedings{99e9fc4a-362c-4cf9-9f2a-748b435ba0dd,
  abstract     = {{Stream ciphers like Snow 2.0 are very promising techniques for encryption in trusted hardware, but demand specialized IP cores to enhance conventional architectures. The paper describes the design of such a core that can be adapted to the system needs according to a ratio of throughput and effective slice usage of 3.2 to 3.5. The footprint is comparable with a commercial floating-point unit.}},
  author       = {{Fang, Wen Hai and Johansson, Thomas and Spaanenburg, Lambert}},
  booktitle    = {{Proceedings - 2005 International Conference on Field Programmable Logic and Applications, FPL}},
  keywords     = {{Behavioral Synthesis; Trusted Hardware; ISA-compliant IP-core; Stream cipher encryption; Pareto curve}},
  language     = {{eng}},
  pages        = {{281--286}},
  publisher    = {{IEEE - Institute of Electrical and Electronics Engineers Inc.}},
  title        = {{Snow 2.0 IP core for trusted hardware}},
  url          = {{http://dx.doi.org/10.1109/FPL.2005.1515735}},
  doi          = {{10.1109/FPL.2005.1515735}},
  volume       = {{2005}},
  year         = {{2005}},
}