skip to main content
10.1145/2902961.2902963acmconferencesArticle/Chapter ViewAbstractPublication PagesglsvlsiConference Proceedingsconference-collections
invited-talk

VLSI Design Methods for Low Power Embedded Encryption

Published: 18 May 2016 Publication History

Abstract

Intelligent things, medical devices, vehicles and factories, all part of cyberphysical systems, will only be secure if we can build devices that can perform the mathematically demanding cryptographic operations in an efficient way. Unfortunately, many of devices operate under extremely limited power, energy and area constraints. Yet we expect that they can execute, often in real-time, the symmetric key, public key and/or hash functions needed for the application. At the same time, we request that the implementations are also secure against a wide range of physical attacks.
This presentation will focus on the design methods to realize cryptographic operations on resource constrained devices. To reach the extremely low power, low energy and area budgets, we need to consider in an integrated way the protocols, the algorithms, the architectures and the circuit aspects of the application. These concepts will be illustrated with the design of several cryptographic co-processors suitable for implementation in embedded context.

Cited By

View all
  • (2019)Right-Provisioned IoT Edge ComputingProceedings of the 2019 Great Lakes Symposium on VLSI10.1145/3299874.3319338(531-536)Online publication date: 13-May-2019
  • (2019)Solving Energy and Cybersecurity Constraints in IoT Devices Using Energy Recovery ComputingProceedings of the 2019 Great Lakes Symposium on VLSI10.1145/3299874.3319337(525-530)Online publication date: 13-May-2019
  • (2019)A Lightweight Cryptography Technique with Random Pattern GenerationWireless Personal Communications: An International Journal10.1007/s11277-018-6092-8104:4(1409-1432)Online publication date: 1-Jun-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
GLSVLSI '16: Proceedings of the 26th edition on Great Lakes Symposium on VLSI
May 2016
462 pages
ISBN:9781450342742
DOI:10.1145/2902961
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 May 2016

Check for updates

Author Tags

  1. cryptography
  2. embedded system security
  3. hardware security

Qualifiers

  • Invited-talk

Conference

GLSVLSI '16
Sponsor:
GLSVLSI '16: Great Lakes Symposium on VLSI 2016
May 18 - 20, 2016
Massachusetts, Boston, USA

Acceptance Rates

GLSVLSI '16 Paper Acceptance Rate 50 of 197 submissions, 25%;
Overall Acceptance Rate 312 of 1,156 submissions, 27%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2019)Right-Provisioned IoT Edge ComputingProceedings of the 2019 Great Lakes Symposium on VLSI10.1145/3299874.3319338(531-536)Online publication date: 13-May-2019
  • (2019)Solving Energy and Cybersecurity Constraints in IoT Devices Using Energy Recovery ComputingProceedings of the 2019 Great Lakes Symposium on VLSI10.1145/3299874.3319337(525-530)Online publication date: 13-May-2019
  • (2019)A Lightweight Cryptography Technique with Random Pattern GenerationWireless Personal Communications: An International Journal10.1007/s11277-018-6092-8104:4(1409-1432)Online publication date: 1-Jun-2019
  • (2017)Economically Optimal Variable Tag Length Message AuthenticationFinancial Cryptography and Data Security10.1007/978-3-319-70972-7_11(204-223)Online publication date: 2017

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media