SecNDP: Secure near-data processing with untrusted memory

W Xiong, L Ke, D Jankov, M Kounavis… - … Symposium on High …, 2022 - ieeexplore.ieee.org
Today's data-intensive applications increasingly suffer from significant performance
bottlenecks due to the limited memory bandwidth of the classical von Neumann architecture …

Low latency PAE: Permutation-Based Address Encryption Hardware Engine for IoT Real-Time Memory Protection

X He, Y Bai, Y Liu, L Du, Z Wang… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
In Internet of Things (IoT) endpoint devices, some data or address ciphers are used for real-
time memory protection to mitigate some side-channel attacks against memories. To better …

A Novel High Throughput-to-Area Efficiency and Strong-Resilience Datapath of AES for Lightweight Implementation in IoT Devices

PY Cheng, YC Su, PCP Chao - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
A new datapath for the advanced encryption standard (AES) is proposed in this work, which
is successfully optimized with a high efficiency of throughout-to-area for lightweight …

Efficient Privacy-Preserving Machine Learning with Lightweight Trusted Hardware

P Huang, T Hoang, Y Li, E Shi, GE Suh - arXiv preprint arXiv:2210.10133, 2022 - arxiv.org
In this paper, we propose a new secure machine learning inference platform assisted by a
small dedicated security processor, which will be easier to protect and deploy compared to …

Computational-Based Advanced Encryption Standard (AES) Accelerator

E Abulibdeh, H Saleh, B Mohammad… - 2023 International …, 2023 - ieeexplore.ieee.org
The demands of high-level security and performance for resource-constrained SoC
represent real challenges. Consequently, the dedicated accelerators are designed to deliver …

Low-Power Implementation of a High-Throughput Multi-core AES Encryption Architecture

PK Dong, HK Nguyen, VP Hoang… - 2020 IEEE Asia Pacific …, 2020 - ieeexplore.ieee.org
Nowadays, the Internet of Things (IoT) has been a focus of research that improves and
optimizes our daily life based on intelligent sensors and smart objects working together …

A Scalable and Configurable Architecture for Hardware Authenticated Encryption Modules Compliant with the CCSDS Security Specifications

L Crocetti, L Fanucci, L Baldanzi… - 2024 Security for Space …, 2024 - ieeexplore.ieee.org
Cybersecurity is one of the most challenging aspects in the modern Information and
Communications Technology (ICT) era, including space applications. The Consultative …

[PDF][PDF] Ultra-high-throughput multi-core aes encryption hardware architecture

PK Dong, HK Nguyen, FA Hussin… - VNU Journal of Science …, 2021 - researchgate.net
Security issues are always a big challenge in high-speed data transfer between devices.
The encryption in cyber security needs high throughput to meet data transfer rates and low …

A reconfigurable permutation based address encryption architecture for memory security

Y Mei, L Du, X He, Y Du, X Chen… - 2020 IEEE 33rd …, 2020 - ieeexplore.ieee.org
Most of the existing memory encryption techniques in IoT devices are based on data
encryption. The level of security increases at the cost of the increased encryption algorithm …

An Improved Unified AES Implementation Using FPGA

B Prakash, V Gupta - International Journal of Embedded and Real …, 2022 - igi-global.com
Encryption is an essential process in electronic data transmission because it securely
protects the data from unauthorized access. In this digital era, information and its security are …