. La-première-Étape, après la mise sous tension) charge la configuration basique du moteur de sécurité. Cela permet alors une vérification basique du matériel ainsi que l'installation de l'interface pour l

. Finalement, le moteur de sécurité charge et installe la version sécurisée du moteur cryptographique

. Debian, the universal operating system

. Ethernet and . Group, Improving Network Performance in Multi-Core Systems

. Intel-nehalem-architecture, http://www.intel.com/technology/ architecture-silicon/next-gen

. Laboratoire-jean-kuntzmann, Mathématiques appliquées -Informatique

T. Laboratoire, Informatique et de la microélectronique pour l'Architecture des systèmes intégrés

B. Augustin, X. Cuvellier, B. Orgogozo, F. Viger, T. Friedman et al., Avoiding traceroute anomalies with Paris traceroute, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, 2006.
DOI : 10.1145/1177080.1177100

URL : https://hal.archives-ouvertes.fr/hal-01097553

M. Bagnulo, RFC 6181 : Threat Analysis for TCP Extensions for Multipath Operation with Multiple Addresses, 2011.

J. Bernard, J. Roch, and D. Traore, Processor-Oblivious Parallel Stream Computations, 16th Euromicro Conference on Parallel, Distributed and Network-Based Processing (PDP 2008), 2007.
DOI : 10.1109/PDP.2008.57

A. Biryukov, A. Shamir, and D. Wagner, Real Time Cryptanalysis of A5/1 on a PC Intercepting mobile communications : the insecurity of 802, Fast Software Encryption MOBICOM, pp.1-18, 1978.

I. Buck, T. Foley, D. Reiter-horn, J. Sugerman, K. Fatahalian et al., Brook for GPUs, ACM Transactions on Graphics, vol.23, issue.3, pp.777-786, 2004.
DOI : 10.1145/1015706.1015800

G. Canivet, J. Clédière, J. Baptiste-ferron, F. Valette, M. Renaudin et al., Detailed Analyses of Single Laser Shot Effects in the Configuration of a Virtex-II FPGA, 2008 14th IEEE International On-Line Testing Symposium, pp.289-294, 2008.
DOI : 10.1109/IOLTS.2008.41

URL : https://hal.archives-ouvertes.fr/hal-00319872

H. K. Chu and V. Kashyap, RFC 4391 : Transmission of IP over InfiniBand (IPoIB), 2006.

A. Conta, S. Deering, M. Gupta, and E. , RFC 4443 : Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification, 2006.

J. Daemen and V. Rijmen, The Design of Rijndael : AES -The Advanced Encryption Standard, 2002.
DOI : 10.1007/978-3-662-04722-4

D. Traore, J. Roch, N. Maiilard, T. Gautier, and J. Bernard, Deque-Free Work-Optimal Parallel STL Algorithms, 2008.
DOI : 10.1007/978-3-540-85451-7_95

M. Dobrescu, N. Egi, K. Argyraki, K. Byung-gon-chun, G. Fall et al., Route- Bricks : Exploiting Parallelism to Scale Software Routers, Proceedings of the 22nd ACM Symposium on Operating Systems Principles (SOSP, 2009.

B. Donnet, M. J. Luckie, P. Mérindol, and J. Pansiot, Revealing MPLS tunnels obscured from traceroute, ACM SIGCOMM Computer Communication Review, vol.42, issue.2, 2012.
DOI : 10.1145/2185376.2185388

S. Drimer, Volatile FPGA design security ? a survey (v0.96), 2008.

M. Dworkin, Recommendation for Block Cipher Modes of Operation : Galois/Counter Mode (GCM) for Confidentiality and Authentication, 2007.

N. Egi, A. Greenhalgh, M. Handley, G. Iannaccone, M. Manesh et al., Improved Forwarding Architecture and Resource Management for Multi-Core Software Routers, 2009 Sixth IFIP International Conference on Network and Parallel Computing, pp.117-124, 2009.
DOI : 10.1109/NPC.2009.39

J. Erickson, Hacking : the art of exploitation, 2008.

H. Feistel, Cryptography and Computer Privacy, Scientific American, vol.228, issue.5, pp.15-23, 1973.
DOI : 10.1038/scientificamerican0573-15

F. Gont, RFC 5927 : ICMP Attacks against TCP, 2010.

F. Gont, G. Gont, and C. Pignataro, Recommendations for filtering ICMP messages, 2013.

F. Gont and C. Pignataro, RFC 6918 : Formally Deprecating Some ICMPv4 Message Types, 2013.

P. Gutmann, Data Remanence in Semiconductor Devices, USENIX Security Symposium, 2001.

J. , A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson et al., Lest we remember : cold-boot attacks on encryption keys, Commun. ACM, vol.52, issue.5, pp.91-98, 2009.

R. L. Hance, K. Erington, and M. A. Chonko, Mobile ion contamination in CMOS circuits: a clear and present danger, Proceedings of 1994 IEEE International Integrated Reliability Workshop (IRWS), p.3, 1994.
DOI : 10.1109/IRWS.1994.515819

O. Hasan, J. Pierson, and L. Brunie, Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp.603-609, 2008.
DOI : 10.1109/EUC.2008.66

H. Peng-he, G. Guan, K. Xie, and . Salamatian, Evaluating and Optimizing IP Lookup on Many Core Processors, ICCCN, pp.1-7, 2012.

R. Housley and . Rfc, Using Advanced Encryption Standard (AES) Counter Mode With IPsec Encapsulating Security Payload (ESP), 2004.
DOI : 10.17487/rfc3686

Y. Hyun, B. Huffaker, D. Andersen, E. Aben, C. Shannon et al., The CAIDA IPv4 Routed /24 Topology Dataset, 2011.

L. Jacquin, État de l'art sur les serveurs réseaux 10 Gbits/sec, 2010.

L. Jacquin, Spécification des flux, 2010.

L. Jacquin, V. Roca, M. A. Kaafar, F. Schuler, and J. Roch, IBTrack: An ICMP black holes tracker, 2012 IEEE Global Communications Conference (GLOBECOM), pp.2827-2833, 2012.
DOI : 10.1109/GLOCOM.2012.6503545

URL : https://hal.archives-ouvertes.fr/hal-00748153

L. Jacquin, V. Roca, J. Roch, and M. A. Ali, Parallel arithmetic encryption for high-bandwidth communications on multicore/GPGPU platforms, Proceedings of the 4th International Workshop on Parallel and Symbolic Computation, PASCO '10, pp.73-79, 2010.
DOI : 10.1145/1837210.1837223

URL : https://hal.archives-ouvertes.fr/hal-00493044

L. Jacquin and F. Schuler, Implantation sur plate-forme PC standard du traitement des flux avec chiffrement simulé sur l'émulateur logiciel restreint du module SHIVA, 2011.

E. Katz-bassett, H. V. Madhyastha, J. P. John, A. Krishnamurthy, D. Wetherall et al., Studying black holes in the internet with Hubble, Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI'08, pp.247-262, 2008.

S. Kent, RFC 4302 : IP Authentication Header, 2005.

S. Kent and K. Seo, RFC 4301 : Security Architecture for the Internet Protocol, 2005.

E. Kohler, The click modular router, ACM Transactions on Computer Systems, vol.18, issue.3, 2001.
DOI : 10.1145/354871.354874

E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek, The click modular router, ACM Transactions on Computer Systems, vol.18, issue.3, pp.263-297, 2000.
DOI : 10.1145/354871.354874

C. Lauradoux, Throughput/code size tradeoff for stream ciphers, Proceedings of SASC 2007 -ECRYPT Workshop on stream ciphers, 2007.

W. Victor, C. Lee, J. Kim, M. Chhugani, D. Deisher et al., Srinivas Chennupaty, Per Hammarlund, Ronak Singhal, and Pradeep Dubey. Debunking the 100X GPU vs. CPU myth : an evaluation of throughput computing on CPU and GPU, Proceedings of the 37th annual international symposium on Computer architecture, ISCA '10, pp.451-460, 2010.

M. Luckie, K. Cho, and B. Owens, Inferring and debugging path MTU discovery failures, Proceedings of the 5th ACM SIGCOMM conference on Internet measurement , IMC '05, pp.17-17, 2005.
DOI : 10.1145/1330107.1330129

M. Luckie and B. Stasiewicz, Measuring path MTU discovery behaviour, Proceedings of the 10th annual conference on Internet measurement, IMC '10, pp.102-108, 2010.
DOI : 10.1145/1879141.1879155

J. Matthew and . Luckie, Scamper : a scalable and extensible packet prober for active measurement of the internet, Internet Measurement Conference, pp.239-245, 2010.

L. Luo, G. Xie, Y. Xie, L. Mathy, and K. Salamatian, A hybrid IP lookup architecture with fast updates, INFOCOM, pp.2435-2443, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00737828

P. Marchetta, P. Mérindol, B. Donnet, A. Pescapè, and J. Pansiot, Topology Discovery at the Router Level: A New Hybrid Tool Targeting ISP Networks, IEEE Journal on Selected Areas in Communications, vol.29, issue.9, pp.1776-1787, 2011.
DOI : 10.1109/JSAC.2011.111003

D. Edoardo and . Mastrovito, VLSI Architectures for Computation in Galois Fields Linköping studies in science and technolog, 1991.

M. Mathis and J. W. Heffner, RFC 4821 : Packetization Layer Path MTU Discovery, 2007.

J. Michael and M. , NSTISSAM TEMPEST/2-95, 1995.

C. B. Mccubbin, A. A. Selçuk, and D. P. Sidhu, Initialization vector attacks on the IPsec protocol suite, Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000), pp.171-175, 2000.
DOI : 10.1109/ENABL.2000.883723

P. Mérindol, B. Donnet, J. Pansiot, M. J. Luckie, and Y. Hyun, MERLIN: MEasure the router level of the INternet, 2011 7th EURO-NGI Conference on Next Generation Internet Networks, pp.1-8, 2011.
DOI : 10.1109/NGI.2011.5985865

J. Mogul and S. Deering, RFC 1191 : Path MTU Discovery, 1990.

E. Gordon and . Moore, Cramming more components onto integrated circuits, Electronics, vol.38, issue.8, pp.114-117, 1965.

E. De-mulder, S. Berna-Örs, B. Preneel, and I. Verbauwhede, Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems, Computers & Electrical Engineering, vol.33, issue.5-6, pp.5-6367, 2007.
DOI : 10.1016/j.compeleceng.2007.05.009

J. Nielsen, Nielsen's Law of Internet Bandwidth, 1998.

V. Nikov, A DoS Attack Against the Integrity-Less ESP (IPSec) IACR Cryptology ePrint Archive, p.370, 2006.

S. Northcutt and J. Novak, Network Intrusion Detection, Third Edition, 2002.

G. Kenneth and . Paterson, A Cryptographic Tour of the IPsec Standards, IACR Cryptology ePrint Archive, p.97, 2006.

G. Kenneth, A. K. Paterson, and . Yau, Cryptography in Theory and Practice : The Case of Encryption in IPsec, Advances in Cryptology -EUROCRYPT 2006, pp.12-29, 2006.

A. Pellegrini, V. Bertacco, and T. M. Austin, Fault-based attack of RSA authentication, 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010), pp.855-860, 2010.
DOI : 10.1109/DATE.2010.5456933

J. Postel, RFC 0792 : Internet Control Message Protocol, 1981.

J. Postel, RFC 0879 : The TCP Maximum Segment Size and Related Topics, 1983.

R. Saadi, J. Pierson, and L. Brunie, T2D, Proceedings of the 2010 ACM Symposium on Applied Computing, SAC '10, pp.1472-1478, 2010.
DOI : 10.1145/1774088.1774403

URL : https://hal.archives-ouvertes.fr/inria-00469649

J. Hadi-salim, R. Olsson, and A. Kuznetsov, Beyond softnet, Proceedings of the 5th annual Linux Showcase & Conference, pp.18-18, 2001.

J. Hadi-salim, R. Olsson, and A. Kuznetsov, Beyond softnet, Proceedings of the 5th annual Linux Showcase & Conference, pp.165-172, 2001.

C. E. Shannon, Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.657-715, 1949.
DOI : 10.1002/j.1538-7305.1949.tb00928.x

W. Shi, S. Hsien-hsin, M. Lee, C. Ghosh, A. Lu et al., High Efficiency Counter Mode Security Architecture via Prediction and Precomputation, ISCA, pp.14-24, 2005.
DOI : 10.1145/1080695.1069972

F. Standaert, F. Macé, E. Peeters, and J. Quisquater, Updates on the Security of FPGAs Against Power Analysis Attacks, ARC, pp.335-346, 2006.
DOI : 10.1007/11802839_42

P. Vicat-blanc, /. Primet, V. Roca, J. Montagnat, J. Gelas et al., Guilherme Piegas Koslovski, and Tram Truong Huu. A Scalable Security Model for Enabling Dynamic Virtual Private Execution Infrastructures on the Internet, 9th IEEE International Symposium on Cluster Computing and the Grid (CCGrid'09), 2009.