Yazar "San, İsmail" için listeleme
-
Compact hardware architecture for Hummingbird cryptographic algorithm
San, İsmail; At, Nuray (2011)Hummingbird is an ultra-lightweight cryptographic algorithm aiming at resource-constrained devices. In this paper, we present an enhanced hardware implementation of the Hummingbird cryptographic algorithm that is based on ... -
Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA
At, Nuray; Beuchat, Jean-Luc; Okamoto, Eiji; San, İsmail; Yamazaki, Teppei (IEEE-Inst Electrical Electronics Engineers Inc, 2014)The cryptographic hash functions BLAKE and Skein are built from the ChaCha stream cipher and the tweakable Threefish block cipher, respectively. Interestingly enough, they are based on the same arithmetic operations, and ... -
Compact implementation of threefish and Skein on FPGA
At, Nuray; Beuchat, Jean-Luc; San, İsmail (2012)The SHA-3 finalist Skein is built from the tweak able Threefish block cipher. In order to have a better understanding of the computational efficiency of Skein (resource sharing, memory access scheme, scheduling, etc.), we ... -
Compact Keccak Hardware Architecture for Data Integrity and Authentication on FPGAs
San, İsmail; At, Nuray (2012)Cryptographic hash functions play a crucial role in networking and communication security, including their use for data integrity and message authentication. Keccak hash algorithm is one of the finalists in the next ... -
Detecting Hardware Trojans in Unspecified Functionality Through Solving Satisfiability Problems
Fern, Nicole; San, İsmail; Cheng, Kwang-Ting (Tim) (IEEE, 2017)For modern complex designs it is impossible to fully specify design behavior, and only feasible to verify functionally meaningful scenarios. Hardware Trojans modifying only unspecified functionality are not possible to ... -
Efficient hardware architectures for crytographic algorithms used in computer and communication systems
San, İsmail (Anadolu Üniversitesi, 2014)Modern kriptografi matematik, elektrik mühendisliği ve bilgisayar bilimini içinde barındıran-bilgi sistemleri için güvenlik hizmetlerinin basit ögelerini sunan önemli bir disiplindir. Günümüzde, daha önemli olan kriptografi ... -
Efficient paillier cryptoprocessor for privacy-preserving data mining
San, İsmail; At, Nuray; Yakut, İbrahim; Polat, Hüseyin (Wiley-Hindawi, 2016)Paillier cryptosystem is extensively utilized as a homomorphic encryption scheme to ensure privacy requirements in many privacy-preserving data mining schemes. However, overall performance of the applications employing ... -
Hardware Trojans in Incompletely Specified On-chip Bus Systems
Fern, Nicole; San, İsmail; Koç, Çetin Kaya; Cheng, Kwang-Ting (Tim) (IEEE, 2016)The security, functionality, and performance of the on-chip bus system is critical in an SoC design. We highlight the susceptibility of current bus implementations to Hardware Trojans hiding in unspecified functionality. ... -
Hardware Trojans in incompletely specified on-chip bus systems
Fern, Nicole; San, İsmail; Koç, Çetin Kaya; Cheng, Kwang-Ting (Tim) (Institute of Electrical and Electronics Engineers Inc., 2016)The security, functionality, and performance of the on-chip bus system is critical in an SoC design. We highlight the susceptibility of current bus implementations to Hardware Trojans hiding in unspecified functionality. ... -
Hiding Hardware Trojan Communication Channels in Partially Specified SoC Bus Functionality
Fern, Nicole; San, İsmail; Koç, Çetin Kaya; Cheng, Kwang-Ting (Tim) (IEEE-Inst Electrical Electronics Engineers Inc, 2017)On-chip bus implementations must be bug-free and secure to provide the functionality and performance required by modern system-on-a-chip (SoC) designs. Regardless of the specific topology and protocol, bus behavior is never ... -
Improving the computational efficiency of modular operations for embedded systems
San, İsmail; At, Nuray (Elsevier, 2014)Security protocols such as IPSec, SSL and VPNs used in many communication systems employ various cryptographic algorithms in order to protect the data from malicious attacks. Thanks to public-key cryptography, a public ... -
A low-area unified hardware architecture for the AES and the cryptographic hash function Grostl
At, Nuray; Beuchat, Jean-Luc; Okamoto, Eiji; San, İsmail; Yamazaki, Teppei (Academic Press Inc Elsevier Science, 2017)This article describes the design of a compact 8-bit coprocessor for the Advanced Encryption standard (AES) (encryption, decryption, and key expansion) and the cryptographic hash function Grostl. Our Arithmetic and Logic ... -
On increasing the computational efficiency of long integer multiplication on FPGA
San, İsmail; At, Nuray (2012)This paper presents a compact hardware architecture for long integer multiplication and proposes a strategy to increase the computational efficiency of the Karatsuba algorithm on FPGA. The presented architecture aims to ... -
Trojans Modifying Soft-Processor Instruction Sequences Embedded in FPGA Bitstreams
San, İsmail; Fern, Nicole; Koç, Çetin Kaya; Cheng, Kwang-Ting (Tim) (IEEE, 2016)Reconfigurable platforms such as FPGAs and CPLDs are used to implement flexible and lightweight embedded systems often using soft-processors and a fixed instruction sequence stored in block memories. The bitstream format ...