IMCRYPTO: an in-memory computing fabric for AES encryption and decryption
This article proposes IMCRYPTO, an in-memory computing (IMC) fabric for accelerating
advanced encryption standard (AES) encryption and decryption. IMCRYPTO employs a …
advanced encryption standard (AES) encryption and decryption. IMCRYPTO employs a …
Lightweight cipher algorithms for smart cards security: A survey and open challenges
Smart cards are secure and multifunctional devices that have become the important part of
our daily life applications ie from finance, transportation, telecommunication to education …
our daily life applications ie from finance, transportation, telecommunication to education …
On the implementation aspects of sponge-based authenticated encryption for pervasive devices
Widespread use of pervasive devices has resulted in security problems which can not be
solved by conventional algorithms and approaches. These devices are not only extremely …
solved by conventional algorithms and approaches. These devices are not only extremely …
ANCHOR: A New Proposed Stream Cipher for Smart Cards with Crypto Co-Processor
AO Elrefai, KA Shehata, HM Eldeeb… - Journal of Advanced …, 2025 - semarakilmu.com.my
A smart card is a small pocket-sized computer with limited resources used for secure data
processing and storage. The card consists of different software and hardware components …
processing and storage. The card consists of different software and hardware components …
Cryptographically secure on-chip firewalling
JM Cioranesco, C Hampel, GO de Almeida… - Network and System …, 2015 - Springer
As SoCs have become more complex, on-chip interconnect has transformed into the point of
integration for a variety of system level functions, including security. Integrators have begun …
integration for a variety of system level functions, including security. Integrators have begun …
High performance Java Card operating system
Due to the fast evolving of trusted computing environments and internet-of-things an eager
need has been established for open platforms which support interchangeable technologies …
need has been established for open platforms which support interchangeable technologies …
Ultra simple way to encrypt non‐volatile main memory
F Hou, H He - Security and Communication Networks, 2015 - Wiley Online Library
Building non‐volatile main memory (NVMM) systems requires the memory data to be
encrypted to remedy the potential security vulnerability caused by the non‐volatile property …
encrypted to remedy the potential security vulnerability caused by the non‐volatile property …
Balancing energy, security and circuit area in lightweight cryptographic hardware design
R Portella - 2016 - theses.hal.science
This thesis addresses lightweight hardware design and countermeasures to improve
cryptographic computation. Because cryptography (and cryptanalysis) is nowadays …
cryptographic computation. Because cryptography (and cryptanalysis) is nowadays …
FlexCOS: An open smartcard platform for research and education
K Beilke, V Roth - Network and System Security: 6th International …, 2012 - Springer
The smartcard industry treats their know-how and products as confidential. Consequently it
is difficult to do research on smartcards without NDAs. We present a platform meant to lower …
is difficult to do research on smartcards without NDAs. We present a platform meant to lower …
Securing mobile device by RAM-encryption
C Boschini, JL Camenisch, T Gagliardoni… - US Patent …, 2023 - Google Patents
The present disclosure relates generally to a method for protecting a mobile device, and
more specifically, to a computer-implemented method for protecting a mobile device against …
more specifically, to a computer-implemented method for protecting a mobile device against …