ABSTRACT
In this poster, we describe a one-size-fits-many Intellectual Property (IP) core which integrates advanced key management technology and streaming encryption into a single component to protect data in-transit.
- https://en.wikipedia.org/wiki/Advanced_Encryption_StandardGoogle Scholar
- https://en.wikipedia.org/wiki/VHDLGoogle Scholar
- https://en.wikipedia.org/wiki/XilinxGoogle Scholar
- https://en.wikipedia.org/wiki/TensilicaGoogle Scholar
- https://en.wikipedia.org/wiki/ARM_Cortex-MGoogle Scholar
Index Terms
- POSTER: SHAMROCK: self contained cryptography and key management processor
Recommendations
Efficient key management FPGA-based cryptosystem using the RNS and iterative coding
The paper reports the development of a new cryptosystem with a multilevel structure for encryption and decryption. At the first level, RNS-based implementation of a public-key RSA signature converts the original plaintext into a ciphertext. Iterated ...
Encrypting Keys Securely
Encryption keys are sometimes encrypted themselves; doing that properly requires special care. Although it might look like an oversight at first, the broadly accepted formal security definitions for cryptosystems don't allow encryption of key-dependent ...
Public-Key encryption from ID-Based encryption without one-time signature
OTM'06: Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part IDesign a secure public key encryption scheme and its security proof are one of the main interests in cryptography In 2004, Canetti, Halevi and Katz [8] constructed a public key encryption (PKE) from a selective identity-based encryption scheme with a ...
Comments