Security trends for fpgas, From Secured to Secure Reconfigurable Systems, p.252, 2011. ,
DOI : 10.1007/978-94-007-1338-3
URL : https://hal.archives-ouvertes.fr/lirmm-00616973
Distributed Security for Communications and Memories in a Multiprocessor Architecture, 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum ,
DOI : 10.1109/IPDPS.2011.158
URL : https://hal.archives-ouvertes.fr/ujm-00664284
Security in embedded systems, ACM Transactions on Embedded Computing Systems, vol.3, issue.3, pp.461-491, 2004. ,
DOI : 10.1145/1015047.1015049
Noccentric security of reconfigurable soc, Proc. ACM/IEEE 1st Int. Symposium on Network-on-Chips, pp.223-232, 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-00165452
A monitoring system for NoCs, Proceedings of the Third International Workshop on Network on Chip Architectures, NoCArc '10, pp.25-30, 2010. ,
DOI : 10.1145/1921249.1921257
SECA, Proceedings of the 2005 international conference on Compilers, architectures and synthesis for embedded systems , CASES '05 ,
DOI : 10.1145/1086297.1086308
Conference on Compilers, Architectures and Synthesis for Embedded Systems, pp.78-89, 2005. ,
Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.281-295, 2007. ,
DOI : 10.1109/SP.2007.28
Design and Implementation of Secure Embedded Systems Based on Trustzone, 2008 International Conference on Embedded Software and Systems, pp.136-141, 2008. ,
DOI : 10.1109/ICESS.2008.59
Memory security management for reconfigurable embedded systems, 2008 International Conference on Field-Programmable Technology, pp.153-160, 2011. ,
DOI : 10.1109/FPT.2008.4762378
URL : https://hal.archives-ouvertes.fr/hal-00369049
Configurable memory security in embedded systems, ACM Transactions on Embedded Computing Systems, vol.12, issue.3, 2011. ,
DOI : 10.1145/2442116.2442121
URL : https://hal.archives-ouvertes.fr/hal-00765636
The Security and Performance of the Galois/Counter Mode (GCM) of Operation, INDOCRYPT, pp.343-355, 2004. ,
DOI : 10.1007/978-3-540-30556-9_27
Analysis of shared-link AXI, IET Computers & Digital Techniques, vol.3, issue.4, p.373, 2009. ,
DOI : 10.1049/iet-cdt.2008.0097