All the AES you need on Cortex-M3 and M4

P Schwabe, K Stoffelen - International Conference on Selected Areas in …, 2016 - Springer
This paper describes highly-optimized AES-{128,192,256\}-CTR assembly implementations
for the popular ARM Cortex-M3 and M4 embedded microprocessors. These …

Fast software AES encryption

DA Osvik, JW Bos, D Stefan, D Canright - Fast Software Encryption: 17th …, 2010 - Springer
This paper presents new software speed records for AES-128 encryption for architectures at
both ends of the performance spectrum. On the one side we target the low-end 8-bit AVR …

Hardware acceleration of compression and encryption in SAP HANA

M Chiosa, F Maschi, I Müller… - Proceedings of the …, 2022 - research-collection.ethz.ch
With the advent of cloud computing, where computational resources are expensive and data
movement needs to be secured and minimized, database management systems need to …

Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards

X Li, W Qiu, D Zheng, K Chen… - IEEE Transactions on …, 2009 - ieeexplore.ieee.org
By exploiting a smart card, this paper presents a robust and efficient password-authenticated
key agreement scheme. This paper strengthens the security of the scheme by addressing …

New AES software speed records

DJ Bernstein, P Schwabe - Progress in Cryptology-INDOCRYPT 2008: 9th …, 2008 - Springer
This paper presents new speed records for AES software, taking advantage of (1)
architecture-dependent reduction of instructions used to compute AES and (2) …

Lightweight fault attack resistance in software using intra-instruction redundancy

C Patrick, B Yuce, NF Ghalaty, P Schaumont - Selected Areas in …, 2017 - Springer
Fault attack countermeasures can be implemented by storing or computing sensitive data in
redundant form, such that the faulty data can be detected and restored. We present a class …

Design and evaluation of a reconfigurable ECU architecture for secure and dependable automotive CPS

B Poudel, A Munir - IEEE Transactions on Dependable and …, 2018 - ieeexplore.ieee.org
The next generation of automobiles integrate a multitude of electronic control units (ECUs) to
implement various automotive control and infotainment applications. However, recent works …

An integer linear programming approach for identifying instruction-set extensions

K Atasu, G Dündar, C Özturan - Proceedings of the 3rd IEEE/ACM/IFIP …, 2005 - dl.acm.org
This paper presents an Integer Linear Programming (ILP) approach to the instruction-set
extension identification problem. An algorithm that iteratively generates and solves a set of …

A differential-linear attack on 12-round Serpent

O Dunkelman, S Indesteege, N Keller - International Conference on …, 2008 - Springer
Serpent is an SP Network block cipher submitted to the AES competition and chosen as one
of its five finalists. The security of Serpent is widely acknowledged, especially as the best …

Security oriented design framework for EM side-channel protection in RTL implementations

J He, H Ma, M Panoff, H Wang, Y Zhao… - … on Computer-Aided …, 2021 - ieeexplore.ieee.org
Electromagnetic (EM) side-channel analysis is a powerful attack for extracting secret
information from cryptographic hardware implementations. Countermeasures have been …