This thesis proposes a Secure Computing Module (SCM) for reconfigurable computing systems. SC provides a protected and reliable computational environment, where data security and protection against malicious attacks to the system is assured. SC is strongly based on encr... View more
 S. Vassiliadis, S. Wong, G. N. Gaydadjiev, K. Bertels, G. Kuzmanov, and E. M. Panainte, “The Molen polymorphic processor,” IEEE Transactions on Computers, pp. 1363- 1375, November 2004.
 Xilinx, Virtex-II Pro and Virtex-II Pro X FPGA User Guide, ug012 (v4.1) ed., March 2007.
 A. Seshadri, A. Perrig, L. van Doorn, and P. K. Khosla, “Swatt: Software-based attestation for embedded devices,” in IEEE Symposium on Security and Privacy, pp. 272-, IEEE Computer Society, May 2004.
 E. Shi, A. Perrig, and L. van Doorn, “Bind: A fine-grained attestation service for secure distributed systems,” in IEEE Symposium on Security and Privacy, May 2005.
 Douglas R. Stinson, “Cryptography - Theory and Practice,” CRC Press, 1995.
 A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography. CRC Press, 2001.
 NIST, “Data encryption standard (DES), FIPS 46-3 ed,” tech. rep., National Institute of Standards and Technology, 1998.
 C. E. Shannon, “Communication theory of secrecy systems,” Bell Systen Technicl Journal, vol. 28, pp. 656-715, October 1949.
 NIST, “Data encryption standard (DES), FIPS 46-2 ed,” tech. rep., National Institute of Standards and Technology, December 1993.