IMCRYPTO: an in-memory computing fabric for AES encryption and decryption

D Reis, H Geng, M Niemier… - IEEE Transactions on Very …, 2022 - ieeexplore.ieee.org
This article proposes IMCRYPTO, an in-memory computing (IMC) fabric for accelerating
advanced encryption standard (AES) encryption and decryption. IMCRYPTO employs a …

Lightweight cipher algorithms for smart cards security: A survey and open challenges

J Kaur, A Kumar, M Bansal - 2017 4th International Conference …, 2017 - ieeexplore.ieee.org
Smart cards are secure and multifunctional devices that have become the important part of
our daily life applications ie from finance, transportation, telecommunication to education …

On the implementation aspects of sponge-based authenticated encryption for pervasive devices

T Yalçın, EB Kavun - Smart Card Research and Advanced Applications …, 2013 - Springer
Widespread use of pervasive devices has resulted in security problems which can not be
solved by conventional algorithms and approaches. These devices are not only extremely …

ANCHOR: A New Proposed Stream Cipher for Smart Cards with Crypto Co-Processor

AO Elrefai, KA Shehata, HM Eldeeb… - Journal of Advanced …, 2025 - semarakilmu.com.my
A smart card is a small pocket-sized computer with limited resources used for secure data
processing and storage. The card consists of different software and hardware components …

Cryptographically secure on-chip firewalling

JM Cioranesco, C Hampel, GO de Almeida… - Network and System …, 2015 - Springer
As SoCs have become more complex, on-chip interconnect has transformed into the point of
integration for a variety of system level functions, including security. Integrators have begun …

High performance Java Card operating system

MR Eletriby, M Sobh, AMB Eldin… - … on Software Security …, 2014 - ieeexplore.ieee.org
Due to the fast evolving of trusted computing environments and internet-of-things an eager
need has been established for open platforms which support interchangeable technologies …

Ultra simple way to encrypt non‐volatile main memory

F Hou, H He - Security and Communication Networks, 2015 - Wiley Online Library
Building non‐volatile main memory (NVMM) systems requires the memory data to be
encrypted to remedy the potential security vulnerability caused by the non‐volatile property …

Balancing energy, security and circuit area in lightweight cryptographic hardware design

R Portella - 2016 - theses.hal.science
This thesis addresses lightweight hardware design and countermeasures to improve
cryptographic computation. Because cryptography (and cryptanalysis) is nowadays …

FlexCOS: An open smartcard platform for research and education

K Beilke, V Roth - Network and System Security: 6th International …, 2012 - Springer
The smartcard industry treats their know-how and products as confidential. Consequently it
is difficult to do research on smartcards without NDAs. We present a platform meant to lower …

Securing mobile device by RAM-encryption

C Boschini, JL Camenisch, T Gagliardoni… - US Patent …, 2023 - Google Patents
The present disclosure relates generally to a method for protecting a mobile device, and
more specifically, to a computer-implemented method for protecting a mobile device against …