A review on security implementations in soft-processors for IoT applications
MA Caraveo-Cacep, R Vázquez-Medina… - Computers & Security, 2024 - Elsevier
With the increase in the number of devices connected to the Internet, the need to maintain
and harden information security in Internet systems has significantly increased. This has led …
and harden information security in Internet systems has significantly increased. This has led …
Recryptor: A reconfigurable cryptographic cortex-M0 processor with in-memory and near-memory computing for IoT security
Providing security for the Internet of Things (IoT) is increasingly important, but supporting
many different cryptographic algorithms and standards within the physical constraints of IoT …
many different cryptographic algorithms and standards within the physical constraints of IoT …
A scalable SIMD RISC-V based processor with customized vector extensions for CRYSTALS-kyber
This paper uses RISC-V vector extensions to speed up lattice-based operations in
architectures based on HW/SW co-design. We analyze the structure of the number-theoretic …
architectures based on HW/SW co-design. We analyze the structure of the number-theoretic …
Maximizing the Potential of Custom RISC-V Vector Extensions for Speeding up SHA-3 Hash Functions
SHA-3 is considered to be one of the most secure standardized hash functions. It relies on
the Keccak-f 1 600 permutation, which operates on an internal state of 1 600 bits, mostly …
the Keccak-f 1 600 permutation, which operates on an internal state of 1 600 bits, mostly …
Design Exploration of SHA-3 ASIP for IoT on a 32-bit RISC-V Processor
J Rao, T Ao, S Xu, K Dai, X Zou - IEICE TRANSACTIONS on …, 2018 - search.ieice.org
Data integrity is a key metric of security for Internet of Things (IoT) which refers to accuracy
and reliability of data during transmission, storage and retrieval. Cryptographic hash …
and reliability of data during transmission, storage and retrieval. Cryptographic hash …
Hardware implementation of a SHA-3 application-specific instruction set processor
Secure Hash Algorithm 3 (SHA-3) based on the Keccak algorithm is the new standard
cryptographic hash function announced by the National Institute of Standards and …
cryptographic hash function announced by the National Institute of Standards and …
A latency-optimized hash-based digital signature accelerator for the tactile internet
F Pauls, R Wittig, G Fettweis - International Conference on Embedded …, 2019 - Springer
Tactile Internet as evolution of the Internet of Things will enable real-time interactive
applications in industry and society. It requires low latency and security. Security comprises …
applications in industry and society. It requires low latency and security. Security comprises …
Vector Instruction Set Extensions for Efficient Computation of Keccak
H Rawat, P Schaumont - IEEE Transactions on Computers, 2017 - ieeexplore.ieee.org
We investigate the design of a new instruction set for the KECCAK permutation, a
cryptographic kernel for hashing, authenticated encryption, keystream generation and …
cryptographic kernel for hashing, authenticated encryption, keystream generation and …
Open-source crypto ip cores for fpgas–overview and evaluation
With the increasing number of electronic based systems being connected to the Internet via
wired or wireless connections in the era of the IoT, the importance of security aspects is well …
wired or wireless connections in the era of the IoT, the importance of security aspects is well …