{"title":"Cryptographic algorithms-on-a-chip: Architectures, designs & implementation platforms","authors":"N. Sklavos","doi":"10.1109/DTIS.2011.5941405","DOIUrl":null,"url":null,"abstract":"This work is related to to System-On-A-Chip architectures and designs methodologies, for cryptographic algorithms implementations. Alternatives approaches are presented, for architecture and design methodologies for block ciphers, stream ciphers, and hash functions. The presented algorithms are the most wide used in all certain of modern applications. Implementations aspects are given for both ASIC and FPGA integration platforms. Synthesis results are illustrated in hardware terms. Attacks on such integrations are also investigated. Comparisons for operating frequency, throughput and allocated resources are given in detail.","PeriodicalId":409387,"journal":{"name":"2011 6th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS)","volume":"182 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 6th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DTIS.2011.5941405","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
This work is related to to System-On-A-Chip architectures and designs methodologies, for cryptographic algorithms implementations. Alternatives approaches are presented, for architecture and design methodologies for block ciphers, stream ciphers, and hash functions. The presented algorithms are the most wide used in all certain of modern applications. Implementations aspects are given for both ASIC and FPGA integration platforms. Synthesis results are illustrated in hardware terms. Attacks on such integrations are also investigated. Comparisons for operating frequency, throughput and allocated resources are given in detail.