Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Roselyne Chotin-Avot is active.

Publication


Featured researches published by Roselyne Chotin-Avot.


ieee intelligent vehicles symposium | 2006

Mapping an obstacles detection, stereo vision-based, software application on a multi-processor system-on-chip

Alain Greiner; Frédéric Pétrot; Mathieu Carrier; Mounir Benabdenbi; Roselyne Chotin-Avot; Raphaël Labayrade

In this paper, we present the implementation of a multi-threaded software application for pre-crash obstacle detection, using stereo vision, and the V-disparity algorithm, that requires intensive computation. This application runs on a generic, low cost, massively parallel, multi-processor system-on-chip (MP-SoC). This hardware architecture is suitable for automotive area with respect to performance, cost, and flexibility constraints. This hardware/software embedded application is able to process 40 stereoscopic pairs per second with 256 lines of 512 pixels images and a disparity range of 256. Our architecture is made of 8 clusters, 30 general-purpose 32-bit processors and 750 Kbytes embedded memory


reconfigurable computing and fpgas | 2013

Efficient multilevel interconnect topology for cluster-based mesh FPGA architecture

Emna Amouri; Adrien Blanchardon; Roselyne Chotin-Avot; Habib Mehrez; Zied Marrakchi

This paper presents an improved cluster-based Mesh architecture. This architecture has a depopulated intra-cluster interconnect, and presents a new hierarchical topology for the switch box which unifies a downward and an upward unidirectional networks. Experimental results of 20 MCNC benchmarks show that density is improved and interconnect area requirement is reduced by 42 % compared to the cluster-based VPR architecture.


applied reconfigurable computing | 2014

FPGA-Based High Performance AES-GCM Using Efficient Karatsuba Ofman Algorithm

Karim Moussa Ali Abdellatif; Roselyne Chotin-Avot; Habib Mehrez

AES-GCM has been utilized in various security applications. It consists of two components: an Advanced Encryption Standard (AES) engine and a Galois Hash (GHASH) core. The performance of the system is determined by the GHASH architecture because of the inherent computation feedback. This paper introduces a modification for the pipelined Karatsuba Ofman Algorithm (KOA)-based GHASH. In particular, the computation feedback is removed by analyzing the complexity of the computation process. The proposed GHASH core is evaluated with three different implementations of AES ( BRAMs-based SubBytes, composite field-based SubBytes, and LUT-based SubBytes). The presented AES-GCM architectures are implemented using Xilinx Virtex5 FPGAs. Our comparison to previous work reveals that our architectures are more performance-efficient (Thr. /Slices).


international midwest symposium on circuits and systems | 2013

Efficient AES-GCM for VPNs using FPGAs

Karim Moussa Ali Abdellatif; Roselyne Chotin-Avot; Habib Mehrez

Since its acceptance as the adopted authenticated encryption algorithm, AES-GCM has been utilized in various security-constrained applications. This paper describes the benefits of adding key-synthesized property to AES-GCM using FPGAs. Presented architectures can be used for applications which require encryption and authentication with slow changing keys like Virtual Private Networks (VPNs). Our architectures were evaluated using Virtex4 and Virtex5 FPGAs. It is shown that the performance of the presented AES-GCM architecture outperforms the previously reported ones.


ifip wireless days | 2013

High speed authenticated encryption for slow changing key applications using reconfigurable devices

Karim Moussa Ali Abdellatif; Roselyne Chotin-Avot; Habib Mehrez

Since its acceptance as the adopted authenticated encryption algorithm, AES-GCM has been utilized in various security-constrained applications. This paper describes the benefits of adding key-synthesized property to AES-GCM using FPGAs. Presented architectures can be used for applications which require encryption and authentication with slow changing keys like Virtual Private Networks (VPNs). Three methods are selected to implement the SubBytes of AES to increase the flexibility of the presented work. Furthermore, we propose a protocol to protect the bitstream of the proposed architectures. Our architectures were evaluated using Virtex5 and Virtex4 FPGAs. It is shown that the performance of the presented AES-GCM architectures outperforms the previously reported ones.


digital systems design | 2016

Using Timing-Driven Inter-FPGA Routing for Multi-FPGA Prototyping Exploration

Umer Farooq; Roselyne Chotin-Avot; Muhammad Moazam Azeem; Zouha Cherif; Maminionja Ravoson; Saqib Khan; Habib Mehrez

Multi-FPGA prototyping, because of its low cost, high speed, and real world testing is quite popular today for pre-silicon verification of increasingly complex designs. In this work, we present a novel exploration flow that is used to analyze and optimize the multi-FPGA based prototyping of complex digital designs. In this flow, an end-to-end experience starting from benchmark generation to optimized inter-FPGA routing is given. For inter-FPGA routing, timing-driven approach is used instead of previously used routability-driven approach. Ten large designs are generated using generic tools of the flow and then effect of number of FPGAs on board, number of inter-FPGA tracks is observed on the performance of generated designs. Extensive experimentation reveals that FPGA board with six FPGAs gives best system frequency results. Furthermore, execution time comparison between routability and timing-driven approach reveals that compared to routability-driven approach, timing-driven approach consumes, on average, 46% less time while giving same or better frequency results.


Microprocessors and Microsystems | 2014

Authenticated encryption on FPGAs from the static part to the reconfigurable part

Karim Moussa Ali Abdellatif; Roselyne Chotin-Avot; Habib Mehrez

Recently, techniques have been invented to combine encryption and authentication into a single algorithm which is called Authenticated Encryption (AE). Combining these two security services in hardware produces smaller area compared to two separate algorithms. AE is implemented in the static part of the FPGA (FPGA silicon) in order to secure the reconfiguration process to ensure the confidentiality and integrity of the bitstream. Also, it is used in the reconfigurable part of the FPGA to support applications which need security requirements like Virtual Private Networks (VPNs). This paper presents two different directions for implementing AE cores on FPGAs. First, we present efficient ASIC implementations of AE algorithms, counter with Cipher Block Chaining Mode (CCM) and Galois Counter Mode (GCM), which are used in the static part of the FPGA in order to secure the reconfiguration process. Our focus on state of the art algorithms for efficient implementations leads to propose efficient compact architectures in order to be used for FPGA bitstream security. Presented ASIC architectures were evaluated by using 90 and 130nm technologies. Second, high-throughput GCM architectures are implemented in the reconfigurable part of the FPGA by taking the advantage of slow changing key environments like VPNs and embedded memory protection. The proposed architectures were evaluated using Virtex5 and Virtex4 FPGAs. It is shown that the performance of the presented work outperforms the previously reported ones.


reconfigurable computing and fpgas | 2013

Improved method for parallel AES-GCM cores using FPGAs

Karim Moussa Ali Abdellatif; Roselyne Chotin-Avot; Habib Mehrez

This paper proposes an efficient method for implementing parallel AES-GCM cores using FPGAs. The proposed method improves the performance of the parallel architecture (Throughput/Slice). Presented architectures can be used for applications which require encryption and authentication with slow changing keys like Virtual Private Networks (VPNs). Our architectures were evaluated using Virtex5 FPGAs. It is shown that the performance of the presented parallel AES-GCM architecture outperforms the previously reported ones.


reconfigurable computing and fpgas | 2013

Lightweight and compact solutions for secure reconfiguration of FPGAs

Karim Moussa Ali Abdellatif; Roselyne Chotin-Avot; Habib Mehrez

Reconfiguration of FPGAs is becoming increasingly popular particularly in networking applications. In order to protect FPGA designs against attacks, secure reconfiguration must be performed. This paper introduces low cost solutions for protecting FPGA designs. This is achieved by implementing low cost hardware architectures of authenticated encryption (AES-CCM, AES-GCM, and PRESENT-GCM) in the static part of the FPGA to perform the decryption and the authentication of bitstreams. Presented architectures were evaluated by using 90 and 130 nm technologies.


Integration | 2013

Exploring redundant arithmetics in computer-aided design of arithmetic datapaths

Sophie Belloeil-Dupuis; Roselyne Chotin-Avot; Habib Mehrez

The rapid pace of technological evolution places a substantial amount of pressure on minimizing the time-to-market for integrated circuit designers. Such pressure on the design cycle combined with strict performance constraints makes the use of computer-aided design tools mandatory. In this context, CAD tools that improve performance in terms of delay, area or power consumption are of interest. In this paper, we present a design environment that is dedicated to arithmetic datapath design support. This environment consists of the following elements: (1) Stratus: a language that is dedicated to the parameterized generation of VLSI modules and that allows several levels of abstraction; (2) ArithLib: a library of parameterized arithmetic IP-block generators; and (3) several optimization algorithms that choose the best architecture for each arithmetic operator of a datapath, given an optimization goal. These algorithms consider binary arithmetic as well as redundant arithmetic, given the good intrinsic performance of redundant architectures. In addition, experimental results are presented.

Collaboration


Dive into the Roselyne Chotin-Avot's collaboration.

Top Co-Authors

Avatar

Habib Mehrez

Pierre-and-Marie-Curie University

View shared research outputs
Top Co-Authors

Avatar

Mounir Benabdenbi

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Karim Moussa Ali Abdellatif

Pierre-and-Marie-Curie University

View shared research outputs
Top Co-Authors

Avatar

Frédéric Pétrot

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge