2 research outputs found

    Snow 2.0 IP core for trusted hardware

    No full text

    Snow 2.0 IP core for trusted hardware

    No full text
    Stream ciphers like Snow 2.0 are very promising techniques for encryption in trusted hardware, but demand specialized IP cores to enhance conventional architectures. The paper describes the design of such a core that can be adapted to the system needs according to a ratio of throughput and effective slice usage of 3.2 to 3.5. The footprint is comparable with a commercial floating-point unit
    corecore