Snow 2.0 IP core for trusted hardware

Wen Hai Fang, Thomas Johansson, Lambert Spaanenburg

Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceedingpeer-review

Abstract

Stream ciphers like Snow 2.0 are very promising techniques for encryption in trusted hardware, but demand specialized IP cores to enhance conventional architectures. The paper describes the design of such a core that can be adapted to the system needs according to a ratio of throughput and effective slice usage of 3.2 to 3.5. The footprint is comparable with a commercial floating-point unit.
Original languageEnglish
Title of host publicationProceedings - 2005 International Conference on Field Programmable Logic and Applications, FPL
PublisherIEEE - Institute of Electrical and Electronics Engineers Inc.
Pages281-286
Volume2005
DOIs
Publication statusPublished - 2005
Event2005 International Conference on Field Programmable Logic and Applications (FPL) - Tampere, Finland
Duration: 2005 Aug 242005 Aug 26

Publication series

Name
Volume2005

Conference

Conference2005 International Conference on Field Programmable Logic and Applications (FPL)
Country/TerritoryFinland
CityTampere
Period2005/08/242005/08/26

Subject classification (UKÄ)

  • Electrical Engineering, Electronic Engineering, Information Engineering

Free keywords

  • Behavioral Synthesis
  • Trusted Hardware
  • ISA-compliant IP-core
  • Stream cipher encryption
  • Pareto curve

Fingerprint

Dive into the research topics of 'Snow 2.0 IP core for trusted hardware'. Together they form a unique fingerprint.

Cite this