Academic literature on the topic 'Crypto Processor'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Crypto Processor.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Crypto Processor"
Rashid, Muhammad, Sajjad Shaukat Jamal, Sikandar Zulqarnain Khan, Adel R. Alharbi, Amer Aljaedi, and Malik Imran. "Elliptic-Curve Crypto Processor for RFID Applications." Applied Sciences 11, no. 15 (July 31, 2021): 7079. http://dx.doi.org/10.3390/app11157079.
Full textCho, Wook-Lae, Ki-Bbeum Kim, Gi-Chur Bae, and Kyung-Wook Shin. "A Crypto-processor Supporting Multiple Block Cipher Algorithms." Journal of the Korea Institute of Information and Communication Engineering 20, no. 11 (November 30, 2016): 2093–99. http://dx.doi.org/10.6109/jkiice.2016.20.11.2093.
Full textSomani, Turki F. Al, M. K. Ibrahim, and Adnan Gutub. "High Performance Elliptic Curve GF(2m) Crypto-processor." Information Technology Journal 5, no. 4 (June 15, 2006): 742–48. http://dx.doi.org/10.3923/itj.2006.742.748.
Full textSaad, Mahaba, Khalid Youssef, Mohamed Tarek, and Hala Abdel-Kader. "Architecture of ASIP Crypto-Processor for Dynamic Runtime Security Applications." Indonesian Journal of Electrical Engineering and Computer Science 4, no. 2 (November 1, 2016): 412. http://dx.doi.org/10.11591/ijeecs.v4.i2.pp412-423.
Full textAhmadi, Hamid Reza, Ali Afzali-Kusha, and Massoud Pedram. "A power-optimized low-energy elliptic-curve crypto-processor." IEICE Electronics Express 7, no. 23 (2010): 1752–59. http://dx.doi.org/10.1587/elex.7.1752.
Full textBouesse, Fraidy, M. Renaudin, and Fabien Germain. "Asynchronous AES Crypto-Processor Including Secured and Optimized Blocks." Journal of Integrated Circuits and Systems 1, no. 1 (November 16, 2004): 5–13. http://dx.doi.org/10.29292/jics.v1i1.249.
Full textMachhout, Mohsen, Zied Guitouni, Kholdoun Torki, and Lazhar Khriji. "Coupled FPGA/ASIC Implementation of Elliptic Curve Crypto-Processor." International journal of Network Security & Its Applications 2, no. 2 (April 25, 2010): 100–112. http://dx.doi.org/10.5121/ijnsa.2010.2208.
Full textImran, Malik, Muhammad Rashid, Atif Raza Jafri, and Muhammad Najam-ul-Islam. "ACryp-Proc: Flexible Asymmetric Crypto Processor for Point Multiplication." IEEE Access 6 (2018): 22778–93. http://dx.doi.org/10.1109/access.2018.2828319.
Full textHuang, Hai, Bin Yu, Zhiwei Liu, Rui Weng, Junfeng Gao, and Mingyuan Ren. "DPA countermeasures for reconfigurable crypto processor using non-deterministic execution." IEICE Electronics Express 15, no. 24 (2018): 20180987. http://dx.doi.org/10.1587/elex.15.20180987.
Full textQin, Xiaotie. "Software Architecture for IPSec Crypto Offload Based on Security Processor." Open Automation and Control Systems Journal 6, no. 1 (December 31, 2014): 952–58. http://dx.doi.org/10.2174/1874444301406010952.
Full textDissertations / Theses on the topic "Crypto Processor"
Gaspar, Lubos. "Crypto-processor - architecture, programming and evaluation of the security." Phd thesis, Université Jean Monnet - Saint-Etienne, 2012. http://tel.archives-ouvertes.fr/tel-00978472.
Full textSbiaa, Fatma. "Modélisation et analyse de la sécurité au niveau système des primitives cryptographique." Thesis, Lorient, 2016. http://www.theses.fr/2016LORIS410.
Full textRegarding the increasing complexity of cryptographic devices, testing their security level against existing attacks requires a fast simulation environment. The Advanced Encryption Standard (AES) is widely used in embedded systems in order to secure the sensitive data. Still, some issues lie in the used key and the S-BOX. The present work presents a SystemC implementation of a chaos-based crypto-processor for the AES algorithm.The design of the proposed architecture is studied using the SystemC tools. The proposed correction approach exploits the chaos theory properties to cope with the defaulting parameters of the AES algorithm. Detailed experimental results are given in order to evaluate the security level and the performance criteria. In fact, the proposed crypto- system presents numerous interesting features, including a high security level, a pixel distributing uniformity, a sufficiently large key-space with improved key sensitivity, and acceptable speed
Buchty, Rainer. "Cryptonite a programmable crypto processor architecture for high bandwidth applications /." [S.l. : s.n.], 2002. http://deposit.ddb.de/cgi-bin/dokserv?idn=966328108.
Full textEgemen, Tufan. "Design And Systemc Implementation Of A Crypto Processor For Aes And Des Algorithms." Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12609110/index.pdf.
Full textKannavara, Raghudeep. "DESIGN AND PERFORMANCE ANALYSIS OF A SECURE PROCES-SOR SCAN-SP WITH CRYPTO-BIOMETRIC CAPABILITIES." Wright State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=wright1254532768.
Full textGóes, Priscilla da Silva. "A perseguição inquisitorial e o criptojudaísmo : estudo dos processos envolvendo o sargento-mor Diogo Vaz e seus familiares (1662-1673)." Pós-Graduação em Ciências da Religião, 2017. http://ri.ufs.br/jspui/handle/123456789/6666.
Full textThe present dissertation, entitled "Inquisitorial persecution and Crypto-Judaism: A study of the processes involving the sergeant-general Diogo Vaz and his relatives (1662-1673)", has as a research object the description and analysis of the Inquisition, specifically in the persecution of New Christians accused of Judaizers in the Iberian Peninsula, as well as in the Colony. We sought to investigate the cases of Diogo Vaz Penalvo, his sister Anna Rodrigues and other members of his family. For this, we are based on the categories of the Ginzburg (2001) index of the microhistory studied by Giovanni Levi (1992) and Ginzburg (2006), the category of pariah explained by Weber (2010) and the sociology of secrecy, of Simmel (2009), of fundamental importance for the maintenance of Crypto-Judaism. From this, we follow the following steps: to reconstruct the steps of members of a family arrested by the Holy Office and compare them with other cases already studied, collaborating with the study of religious practices that resisted Catholicism in the colonial period; to find in the reports of the documents indications of religious practices considered deviant from the Catholic faith. Finally, this research aims to contribute to the study of the inquisition with a focus on the persecution of the Crypto-Jews, in an attempt to know the religious practices of a family that suffered for more than a decade humiliation, exile and fire.
A presente dissertação, intitulada “A perseguição inquisitorial e o Criptojudaísmo: Estudo dos processos envolvendo o sargento-mor Diogo Vaz e seus familiares (1662-1673)”, tem como objeto de pesquisa a descrição e análise da Inquisição, especificamente na perseguição aos cristãos-novos acusados de judaizantes na Península Ibérica, assim como na Colônia. Buscamos investigar os casos de Diogo Vaz Penalvo, de sua irmã Anna Rodrigues e de outros membros da sua família. Para tal, baseamo-nos nas categorias do paradigma indiciário de Ginzburg (2001), da micro-história estudada por Giovanni Levi (1992) e Ginzburg (2006), a categoria de pária explicada por Weber (2010) e a sociologia do segredo, de Simmel (2009), de fundamental importância para a manutenção do criptojudaísmo. A partir disso, seguimos os seguintes caminhos: reconstruir os passos de membros de uma família presa pelo Santo Ofício e compará-los com outros casos já estudados, colaborando com o estudo de práticas religiosas que resistiram ao catolicismo no período colonial; encontrar nos relatos dos documentos indícios de práticas religiosas consideradas desviantes da fé católica. Por fim, esta pesquisa visa contribuir para o estudo do tema da inquisição com o foco na perseguição aos criptojudeus, na tentativa de conhecer as práticas religiosas de uma família que sofreu durante mais de uma década a humilhação, o degredo, a tomada de bens e o fogo.
São Cristóvão, SE
Zeng, Chenxi. "A minimum cost and risk mitigation approach for blood collection." Diss., Georgia Institute of Technology, 2016. http://hdl.handle.net/1853/54966.
Full textGuilbaud, Sarah. "Etude du vieillissement des aérosols inorganiques industriels en milieu urbain." Thesis, Littoral, 2018. http://www.theses.fr/2018DUNK0524/document.
Full textDuring their transport in the atmosphere, aerosols are subject, for example, to aggregation and condensation processes on their surfaces. These processes, so-called aging, depend on particle residence time in the atmosphere, meteorological conditions and chemical environment. This study aims to characterize inorganic aerosols and to highlight their physico-chemical evolution on a few tens of thousands meters, from an industrial area to the urban environment of Dunkirk (Northern France), in which PM₁₀ concentrations are quite important. It notably includes reporting on the evolution of primary particles during the formation of secondary inorganic aerosols. First, a new analytical methodology of inorganic aerosols, at low temperature, with cryo-electronic microscopy (cryo-TSEM-EDX) has been developed. Our goal was to characterize the mixing state of secondary atmospheric components (semi-volatile components) with primary aerosols. These analytical developments have been realized with model particles, before validation on real atmospheric particles. In a second time, the study of physico-chemical processes involved in the aging of industrial inorganic aerosols has been undertaken through an intensive field campaign. The objective is to describe the particles evolution between the industrial zone and receptor sites located in the suburb of Dunkirk. Our main results show that Fe-rich particles (Fe oxides), released in the atmosphere by steelworks, incorporate particulate organic matter in a few kilometers, between the source and receptor sites. In addition, the formation of secondary inorganic aerosols (SIA), not present at the source, has been evidenced. Clearly, these SIA have been formed during the transport of air masses over the urban area
Taheri, Shabnam. "Macro and micro-evolutionary processes within a complex of species, case study of the tropical invasive earthworm : pontoscolex corethrurus." Thesis, Paris Est, 2018. http://www.theses.fr/2018PESC1024/document.
Full textPontoscolex corethrurus is the most widespread earthworm species in the tropical and sub-tropical zones, it is hence one of the most studied earthworm in soil science. Ecological aspects of P. corethrurus, which is known to be present in a wide range of habitats from poor soils of pasture to rich soils of primary forest, were intensively investigated but biological aspects are less addressed. In particular, information on the genetic variation within the morphospecies is scarce except for the finding of two genetically differentiated lineages in São Miguel Island of Azores archipelago in 2014. Moreover, the ploidy degree of the morphospecies is not yet known and its reproduction strategy is not well understood. One of the objectives of this thesis was to understand the mechanisms and characteristics which make P. corethrurus a successful invader. Our second objective was to look for cryptic lineages in the whole world and to describe the phylogenetic relationships between them. A third objective was to identify which lineage was invasive and to characterize its population genetic structure in the native and the introduced ranges. The last objective was to test if the different species of the complex have different ploidy degrees (polyploid complex). This could eventually explain the reproductive isolation among these species. A bibliographic synthesis of 265 studies covering all subjects of knowledge on P. corethrurus showed that the r strategy and plasticity of this earthworm are the key characteristics which make it a successful invader in different habitats. In order to investigate the cryptic diversity within P. corethrurus in a world-wide scale, I examined 792 specimens collected from 25 different countries and islands. These specimens were analyzed using two mitochondrial (COI and 16S rDNA) and two nuclear (internal transcribed spacers 2 and 28S rDNA) markers and a large-scale multilocus sequence data matrix obtained using the Anchored Hybrid Enrichment (AHE) method. In addition, a total of 11 morphological characters, both internal and external, were investigated in all genetically characterized lineages. Four cryptic species (L1, L2, L3 and L4) were found within the P. corethrurus species complex, and four potentially new species within the genus Pontoscolex. The cryptic species were observed in sympatry at several localities, and analyses based on AFLP markers showed no hybridization among L1 and L3. The possibility of reproductive isolation among species of the complex because of different ploidy degrees was investigated by cytogenetic experimentations. Due to different obstacles encountered at different steps of the experimentations, results were just obtained for L4 (2n=70). One of the species belonging to the complex, L1, was particularly widespread per comparison with the others. This species corresponded to topotype specimens (samples from Fritz Müller’s garden where P. corethrurus was first described in 1856). Thus, we focused on this invasive species in a population genetics and phylogeography study. Using COI gene and AFLP markers, we revealed low genetic diversity through the tropical zone, probably due to recent colonization events and asexual reproduction type. Meanwhile, due to weak linkage disequilibrium and relatively high genetic diversity in some populations, sexual reproduction was suggested for L1.To date, this is the first study investigating at a world-wide scale, cryptic species diversity, population genetics and phylogeography of a peregrine earthworm species throughout tropical zone. I produced the first comprehensive review of all ecological and biological aspects of P. corethrurus. Moreover, the taxonomic status of P. corethrurus was clarified as well as its reproduction strategy which is mixed (parthenogenetic and sexual). All these findings represent potentially useful information for future experimentations and researches on species of P. corethrurus complex
Wang, Chen-Hsing, and 王振興. "A High-Speed Word-Based RSA Crypto-Processor." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/62882018330106829721.
Full text國立清華大學
電機工程學系
91
Security plays an important role in wireless communication system or network system today. Without security, people won’t safely take many applications on wired or wireless internet. Cryptography is a well solution that provides the security for our requirement and RSA cryptographic algorithm is a well known algorithm whose security is no problem. In this thesis, a high speed word-based modular multiplier is proposed based on our modified word-based Montgomery multiplication algorithm. The major advantage of word-based architecture is providing the scalable key length. In addition to the scalability of key length, it also has better flexibility between area and performance. Since the encryption and decryption of RSA cryptographic algorithm are long interger modular exponentiation, a software implementation is not efficient. It needs a dedicated hardware to help CPU handle the data encryption and decryption. Based on the word-based modular multiplier, we design a RSA crypto-processor. The RSA crypto-processor supports four basic modular operations: modular addition, modular subtraction, modular multiplication and modular exponentiation. A synthesis result reports that the RSA crypto-processor can run at 300MHz and the area of the RSA crypto-processor is about 150k gates. A 512 bit modular exponentiation only spends 1.38 ms.
Books on the topic "Crypto Processor"
Fabris, Flavia. Waddington’s Processual Epigenetics and the Debate over Cryptic Variability. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198779636.003.0012.
Full textMinelli, Alessandro. Evolvability and Its Evolvability. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780199377176.003.0007.
Full textMcEvoy, Rory, and Jonathan Betts, eds. Harrison Decoded. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198816812.001.0001.
Full textDworkin, Craig. Dictionary Poetics. Fordham University Press, 2020. http://dx.doi.org/10.5422/fordham/9780823287987.001.0001.
Full textContemporary Musicians: Profiles of the People in Music (Contemporary Musicians). Thomson Gale, 2004.
Find full textContemporary Musicians: Profiles Of The People In Music (Contemporary Musicians). Thomson Gale, 2005.
Find full textPilchak, Angela M. Contemporary Musicians: Profiles of the People in Music (Contemporary Musicians). Thomson Gale, 2005.
Find full textPilchak, Angela M. Contemporary Musicians: Profiles Of The People In Music (Contemporary Musicians). Thomson Gale, 2005.
Find full textContemporary Musicians: Profiles of the People in Music (Contemporary Musicians). Thomson Gale, 2005.
Find full textPilchak, Angela M. Contemporary Musicians: Profiles of the People in Music (Contemporary Musicians). Thomson Gale, 2005.
Find full textBook chapters on the topic "Crypto Processor"
Breuer, Peter T., and Jonathan P. Bowen. "A Fully Homomorphic Crypto-Processor Design." In Lecture Notes in Computer Science, 123–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36563-8_9.
Full textBreuer, Peter T., and Jonathan P. Bowen. "Erratum: A Fully Homomorphic Crypto-Processor Design." In Lecture Notes in Computer Science, E1. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36563-8_16.
Full textBreuer, Peter T., and Jonathan P. Bowen. "Typed Assembler for a RISC Crypto-Processor." In Lecture Notes in Computer Science, 22–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28166-2_3.
Full textChoi, W. P., and L. M. Cheng. "Modelling the Crypto-Processor from Design to Synthesis." In Cryptographic Hardware and Embedded Systems, 25–36. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48059-5_4.
Full textBreuer, Peter T., and Jonathan P. Bowen. "Idea: Towards a Working Fully Homomorphic Crypto-processor." In Lecture Notes in Computer Science, 131–40. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04897-0_9.
Full textEl-Hadedy, Mohamed, Xinfei Guo, Kevin Skadron, and Wen-Mei Hwu. "Edge Crypt-Pi: Securing Internet of Things with Light and Fast Crypto-Processor." In Advances in Intelligent Systems and Computing, 749–61. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-63092-8_50.
Full textGnanasekaran, Lavanya, Anas Salah Eddin, Halima El Naga, and Mohamed El-Hadedy. "Efficient RSA Crypto Processor Using Montgomery Multiplier in FPGA." In Advances in Intelligent Systems and Computing, 379–89. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-32523-7_26.
Full textPöpper, Christopher, Oliver Mischke, and Tim Güneysu. "MicroACP - A Fast and Secure Reconfigurable Asymmetric Crypto-Processor." In Lecture Notes in Computer Science, 240–47. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05960-0_24.
Full textBuchty, Rainer, Nevin Heintze, and Dino Oliva. "Cryptonite – A Programmable Crypto Processor Architecture for High-Bandwidth Applications." In Lecture Notes in Computer Science, 184–98. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24714-2_15.
Full textSaikia, Monjul, and Md Anwar Hussain. "Implementation of Lightweight Crypto Processor Using Logistic Map for Wireless Sensor Network." In Advances in Communication, Devices and Networking, 509–19. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-3450-4_55.
Full textConference papers on the topic "Crypto Processor"
Murphy, Julian, and Alex Yakovlev. "An Alternating Spacer AES Crypto-processor." In 2006 Proceedings of the 32nd European Solid-State Circuits Conference. IEEE, 2006. http://dx.doi.org/10.1109/esscir.2006.307547.
Full textOliva, Dino, Rainer Buchty, and Nevin Heintze. "AES and the cryptonite crypto processor." In the international conference. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/951710.951738.
Full textNima, Karimpour Darav, Ebrahimi Atani Reza, Aghaei Erfan, Tahmasivand Ahmad, Rahmani Mahsa, and Moazam Mina. "CIARP: Crypto instruction-aware RISC processor." In 2012 IEEE Symposium on Computers & Informatics (ISCI). IEEE, 2012. http://dx.doi.org/10.1109/isci.2012.6222696.
Full textBilgin, Begul, Elif Bilge Kavun, and Tolga Yalcin. "Towards an Ultra Lightweight Crypto Processor." In Privacy: Devices, Protocols, and Applications. IEEE, 2011. http://dx.doi.org/10.1109/lightsec.2011.17.
Full textHaghighizadeh, F., H. Attarzadeh, and M. Sharifkhani. "A Compact 8-Bit AES Crypto-processor." In 2010 Second International Conference on Computer and Network Technology. IEEE, 2010. http://dx.doi.org/10.1109/iccnt.2010.50.
Full textAnwar, Hassan, Masoud Daneshtalab, Masoumeh Ebrahimi, Juha Plosila, Hannu Tenhunen, Sergei Dytckov, and Giovanni Beltrame. "Parameterized AES-Based Crypto Processor for FPGAs." In 2014 17th Euromicro Conference on Digital System Design (DSD). IEEE, 2014. http://dx.doi.org/10.1109/dsd.2014.90.
Full textMirzaee, Reza Faghih, and Mohammad Eshghi. "Design of an ASIP IDEA crypto processor." In 2011 IEEE 2nd International Conference on Networked Embedded Systems for Enterprise Applications (NESEA). IEEE, 2011. http://dx.doi.org/10.1109/nesea.2011.6144954.
Full textDai, ZiBin, XueRong Yu, JinHai Su, and XingYuan Chen. "Accelerated Flexible Processor Architecture for Crypto Information." In 2007 2nd International Conference on Pervasive Computing and Applications. IEEE, 2007. http://dx.doi.org/10.1109/icpca.2007.4365476.
Full textMegalingam, R. K., I. P. Joseph, P. Gautham, R. Parthasarathy, K. B. Deepu, and M. M. Nair. "Reconfigurable Cryptographic Processor for multiple crypto-algorithms." In 2011 IEEE Students' Technology Symposium (TechSym). IEEE, 2011. http://dx.doi.org/10.1109/techsym.2011.5783846.
Full textAnwar, Hassan, Masoud Daneshtalab, Masoumeh Ebrahimi, Juha Plosila, and Hannu Tenhunen. "FPGA implementation of AES-based crypto processor." In 2013 IEEE 20th International Conference on Electronics, Circuits, and Systems (ICECS). IEEE, 2013. http://dx.doi.org/10.1109/icecs.2013.6815431.
Full textReports on the topic "Crypto Processor"
Chao, B. P. A review of user interface design techniques with applications to the Crypto Algorithm Message Processor (CAMP). Office of Scientific and Technical Information (OSTI), March 1989. http://dx.doi.org/10.2172/6355608.
Full textMouha, Nicky. Review of the Advanced Encryption Standard. National Institute of Standards and Technology, July 2021. http://dx.doi.org/10.6028/nist.ir.8319.
Full text