Configurable computing for high-security/high-performance ambient systems

3Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper stresses why configurable computing is a promising target to guarantee the hardware security of ambient systems. Many works have focused on configurable computing to demonstrate its efficiency but as far as we know none have addressed the security issue from system to circuit levels. This paper recalls main hardware attacks before focusing on issues to build secure systems on configurable computing. Two complementary views are presented to provide a guide for security and main issues to make them a reality are discussed. As the security at the system and architecture levels is enforced by agility significant aspects related to that point are presented and illustrated through the AES algorithm. The goal of this paper is to make designers aware of that configurable computing is not just hardware accelerators for security primitives as most studies have focused on but a real solution to provide high-security/high-performance for the whole system. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Gogniat, G., Burleson, W., & Bossuet, L. (2005). Configurable computing for high-security/high-performance ambient systems. In Lecture Notes in Computer Science (Vol. 3553, pp. 72–81). Springer Verlag. https://doi.org/10.1007/11512622_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free