après la mise sous tension) charge la configuration basique du moteur de sécurité. Cela permet alors une vérification basique du matériel ainsi que l'installation de l'interface pour l ,
le moteur de sécurité charge et installe la version sécurisée du moteur cryptographique ,
the universal operating system ,
Improving Network Performance in Multi-Core Systems ,
http://www.intel.com/technology/ architecture-silicon/next-gen ,
Mathématiques appliquées -Informatique ,
Informatique et de la microélectronique pour l'Architecture des systèmes intégrés ,
Avoiding traceroute anomalies with Paris traceroute, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, 2006. ,
DOI : 10.1145/1177080.1177100
URL : https://hal.archives-ouvertes.fr/hal-01097553
RFC 6181 : Threat Analysis for TCP Extensions for Multipath Operation with Multiple Addresses, 2011. ,
Processor-Oblivious Parallel Stream Computations, 16th Euromicro Conference on Parallel, Distributed and Network-Based Processing (PDP 2008), 2007. ,
DOI : 10.1109/PDP.2008.57
Real Time Cryptanalysis of A5/1 on a PC Intercepting mobile communications : the insecurity of 802, Fast Software Encryption MOBICOM, pp.1-18, 1978. ,
Brook for GPUs, ACM Transactions on Graphics, vol.23, issue.3, pp.777-786, 2004. ,
DOI : 10.1145/1015706.1015800
Detailed Analyses of Single Laser Shot Effects in the Configuration of a Virtex-II FPGA, 2008 14th IEEE International On-Line Testing Symposium, pp.289-294, 2008. ,
DOI : 10.1109/IOLTS.2008.41
URL : https://hal.archives-ouvertes.fr/hal-00319872
RFC 4391 : Transmission of IP over InfiniBand (IPoIB), 2006. ,
RFC 4443 : Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification, 2006. ,
The Design of Rijndael : AES -The Advanced Encryption Standard, 2002. ,
DOI : 10.1007/978-3-662-04722-4
Deque-Free Work-Optimal Parallel STL Algorithms, 2008. ,
DOI : 10.1007/978-3-540-85451-7_95
Route- Bricks : Exploiting Parallelism to Scale Software Routers, Proceedings of the 22nd ACM Symposium on Operating Systems Principles (SOSP, 2009. ,
Revealing MPLS tunnels obscured from traceroute, ACM SIGCOMM Computer Communication Review, vol.42, issue.2, 2012. ,
DOI : 10.1145/2185376.2185388
Volatile FPGA design security ? a survey (v0.96), 2008. ,
Recommendation for Block Cipher Modes of Operation : Galois/Counter Mode (GCM) for Confidentiality and Authentication, 2007. ,
Improved Forwarding Architecture and Resource Management for Multi-Core Software Routers, 2009 Sixth IFIP International Conference on Network and Parallel Computing, pp.117-124, 2009. ,
DOI : 10.1109/NPC.2009.39
Hacking : the art of exploitation, 2008. ,
Cryptography and Computer Privacy, Scientific American, vol.228, issue.5, pp.15-23, 1973. ,
DOI : 10.1038/scientificamerican0573-15
RFC 5927 : ICMP Attacks against TCP, 2010. ,
Recommendations for filtering ICMP messages, 2013. ,
RFC 6918 : Formally Deprecating Some ICMPv4 Message Types, 2013. ,
Data Remanence in Semiconductor Devices, USENIX Security Symposium, 2001. ,
Lest we remember : cold-boot attacks on encryption keys, Commun. ACM, vol.52, issue.5, pp.91-98, 2009. ,
Mobile ion contamination in CMOS circuits: a clear and present danger, Proceedings of 1994 IEEE International Integrated Reliability Workshop (IRWS), p.3, 1994. ,
DOI : 10.1109/IRWS.1994.515819
Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp.603-609, 2008. ,
DOI : 10.1109/EUC.2008.66
Evaluating and Optimizing IP Lookup on Many Core Processors, ICCCN, pp.1-7, 2012. ,
Using Advanced Encryption Standard (AES) Counter Mode With IPsec Encapsulating Security Payload (ESP), 2004. ,
DOI : 10.17487/rfc3686
The CAIDA IPv4 Routed /24 Topology Dataset, 2011. ,
État de l'art sur les serveurs réseaux 10 Gbits/sec, 2010. ,
Spécification des flux, 2010. ,
IBTrack: An ICMP black holes tracker, 2012 IEEE Global Communications Conference (GLOBECOM), pp.2827-2833, 2012. ,
DOI : 10.1109/GLOCOM.2012.6503545
URL : https://hal.archives-ouvertes.fr/hal-00748153
Parallel arithmetic encryption for high-bandwidth communications on multicore/GPGPU platforms, Proceedings of the 4th International Workshop on Parallel and Symbolic Computation, PASCO '10, pp.73-79, 2010. ,
DOI : 10.1145/1837210.1837223
URL : https://hal.archives-ouvertes.fr/hal-00493044
Implantation sur plate-forme PC standard du traitement des flux avec chiffrement simulé sur l'émulateur logiciel restreint du module SHIVA, 2011. ,
Studying black holes in the internet with Hubble, Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI'08, pp.247-262, 2008. ,
RFC 4302 : IP Authentication Header, 2005. ,
RFC 4301 : Security Architecture for the Internet Protocol, 2005. ,
The click modular router, ACM Transactions on Computer Systems, vol.18, issue.3, 2001. ,
DOI : 10.1145/354871.354874
The click modular router, ACM Transactions on Computer Systems, vol.18, issue.3, pp.263-297, 2000. ,
DOI : 10.1145/354871.354874
Throughput/code size tradeoff for stream ciphers, Proceedings of SASC 2007 -ECRYPT Workshop on stream ciphers, 2007. ,
Srinivas Chennupaty, Per Hammarlund, Ronak Singhal, and Pradeep Dubey. Debunking the 100X GPU vs. CPU myth : an evaluation of throughput computing on CPU and GPU, Proceedings of the 37th annual international symposium on Computer architecture, ISCA '10, pp.451-460, 2010. ,
Inferring and debugging path MTU discovery failures, Proceedings of the 5th ACM SIGCOMM conference on Internet measurement , IMC '05, pp.17-17, 2005. ,
DOI : 10.1145/1330107.1330129
Measuring path MTU discovery behaviour, Proceedings of the 10th annual conference on Internet measurement, IMC '10, pp.102-108, 2010. ,
DOI : 10.1145/1879141.1879155
Scamper : a scalable and extensible packet prober for active measurement of the internet, Internet Measurement Conference, pp.239-245, 2010. ,
A hybrid IP lookup architecture with fast updates, INFOCOM, pp.2435-2443, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00737828
Topology Discovery at the Router Level: A New Hybrid Tool Targeting ISP Networks, IEEE Journal on Selected Areas in Communications, vol.29, issue.9, pp.1776-1787, 2011. ,
DOI : 10.1109/JSAC.2011.111003
VLSI Architectures for Computation in Galois Fields Linköping studies in science and technolog, 1991. ,
RFC 4821 : Packetization Layer Path MTU Discovery, 2007. ,
NSTISSAM TEMPEST/2-95, 1995. ,
Initialization vector attacks on the IPsec protocol suite, Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000), pp.171-175, 2000. ,
DOI : 10.1109/ENABL.2000.883723
MERLIN: MEasure the router level of the INternet, 2011 7th EURO-NGI Conference on Next Generation Internet Networks, pp.1-8, 2011. ,
DOI : 10.1109/NGI.2011.5985865
RFC 1191 : Path MTU Discovery, 1990. ,
Cramming more components onto integrated circuits, Electronics, vol.38, issue.8, pp.114-117, 1965. ,
Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems, Computers & Electrical Engineering, vol.33, issue.5-6, pp.5-6367, 2007. ,
DOI : 10.1016/j.compeleceng.2007.05.009
Nielsen's Law of Internet Bandwidth, 1998. ,
A DoS Attack Against the Integrity-Less ESP (IPSec) IACR Cryptology ePrint Archive, p.370, 2006. ,
Network Intrusion Detection, Third Edition, 2002. ,
A Cryptographic Tour of the IPsec Standards, IACR Cryptology ePrint Archive, p.97, 2006. ,
Cryptography in Theory and Practice : The Case of Encryption in IPsec, Advances in Cryptology -EUROCRYPT 2006, pp.12-29, 2006. ,
Fault-based attack of RSA authentication, 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010), pp.855-860, 2010. ,
DOI : 10.1109/DATE.2010.5456933
RFC 0792 : Internet Control Message Protocol, 1981. ,
RFC 0879 : The TCP Maximum Segment Size and Related Topics, 1983. ,
T2D, Proceedings of the 2010 ACM Symposium on Applied Computing, SAC '10, pp.1472-1478, 2010. ,
DOI : 10.1145/1774088.1774403
URL : https://hal.archives-ouvertes.fr/inria-00469649
Beyond softnet, Proceedings of the 5th annual Linux Showcase & Conference, pp.18-18, 2001. ,
Beyond softnet, Proceedings of the 5th annual Linux Showcase & Conference, pp.165-172, 2001. ,
Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.657-715, 1949. ,
DOI : 10.1002/j.1538-7305.1949.tb00928.x
High Efficiency Counter Mode Security Architecture via Prediction and Precomputation, ISCA, pp.14-24, 2005. ,
DOI : 10.1145/1080695.1069972
Updates on the Security of FPGAs Against Power Analysis Attacks, ARC, pp.335-346, 2006. ,
DOI : 10.1007/11802839_42
Guilherme Piegas Koslovski, and Tram Truong Huu. A Scalable Security Model for Enabling Dynamic Virtual Private Execution Infrastructures on the Internet, 9th IEEE International Symposium on Cluster Computing and the Grid (CCGrid'09), 2009. ,