@inproceedings{Hutter2011ACryptographicProcessor,
  author        = {Michael Hutter and Martin Feldhofer and Johannes Wolkerstorfer},
  title         = {A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES like Sardines},
  booktitle     = {Information Security Theory and Practices -- WISTP 2011, 5th International Workshop, Heraklion, Crete, Greece, June 1-3},
  year          = {2011},
  editor        = {Claudio Agostino Ardagna and Jianying Zhou},
  volume        = {6633},
  series        = {Lecture Notes in Computer Science},
  pages         = {144--159},
  publisher     = {Springer},
  doi           = {10.1007/978-3-642-21040-2_10},
  keywords      = {Cryptographic Processor, ECDSA, ECC, AES, SHA-1, ASIC Implementation, Low-Resource Constraints},
  url           = {http://www.springerlink.com/content/n418811588286661/},
  abstract      = {The Elliptic Curve Digital Signature Algorithm (ECDSA) and the Advanced Encryption Standard (AES) are two of the most popular cryptographic algorithms used worldwide. In this paper, we present a hardware implementation of a low-resource cryptographic processor that provides both digital signature generation using ECDSA and encryption/decryption services using AES. The implementation of ECDSA is based on the recommended $\mathbb{F}_{p192}$ NIST elliptic curve and AES uses 128-bit keys. In order to meet the low-area requirements, we based our design on a sophisticated hardware architecture where a 16-bit datapath gets heavily reused by all algorithms and the memory is implemented as a dedicated RAM macro. The proposed processor has a total chip area of $21\,502$\,GEs where AES needs only $2\,387$ GEs and SHA-1 requires 889 GEs.}
}