@inproceedings{99e9fc4a362c4cf99f2a748b435ba0dd,
title = "Snow 2.0 IP core for trusted hardware",
abstract = "Stream ciphers like Snow 2.0 are very promising techniques for encryption in trusted hardware, but demand specialized IP cores to enhance conventional architectures. The paper describes the design of such a core that can be adapted to the system needs according to a ratio of throughput and effective slice usage of 3.2 to 3.5. The footprint is comparable with a commercial floating-point unit.",
keywords = "Behavioral Synthesis, Trusted Hardware, ISA-compliant IP-core, Stream cipher encryption, Pareto curve",
author = "Fang, {Wen Hai} and Thomas Johansson and Lambert Spaanenburg",
year = "2005",
doi = "10.1109/FPL.2005.1515735",
language = "English",
volume = "2005",
publisher = "IEEE - Institute of Electrical and Electronics Engineers Inc.",
pages = "281--286",
booktitle = "Proceedings - 2005 International Conference on Field Programmable Logic and Applications, FPL",
address = "United States",
note = "2005 International Conference on Field Programmable Logic and Applications (FPL) ; Conference date: 24-08-2005 Through 26-08-2005",
}