Abstract. We examine secure computing paradigms to identify any new architectural challenges for future general-purpose processors. Some essential security functions can be provided by different classes of cryptography algorithms. We identify two categories of operations in these algorithms that are not common in previous general-purpose workloads: bit operations within a word and multi-word operations. Both challenge the basic word orientation of processors. We show how very complex bit-level operations, namely arbitrary bit permutations within a word, can be achieved in O(1) cycles, rather than O(n) cycles as in existing RISC processors. We describe two solutions: one using only microarchitecture changes, and another with Instruction Set ...
Abstract--Cryptographic algorithms are important components in secure systems. We propose PAX, a tin...
With more computing platforms connected to the Internet each day, computer system security has becom...
Modern multiprocessor systems offer advanced synchronization primitives, built in hardware, to suppo...
Abstract — The increasing importance of secure information processing in publicly accessible Interne...
To achieve pervasive secure information processing over the public wired and wireless Internet, it i...
The workload of computers has changed dramatically. New user requirements include the increasing nee...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
We propose two new instructions, swperm and sieve, that can be used to efficiently complete an arbit...
Encryption is being used more than ever before. It is used to prevent eavesdropping on our communica...
Cryptographic algorithms, although being secure in theoretical construction, have many practical imp...
The pursuit of secure computation has always featured a tension between performance and security. Se...
Abstract. The effective use of parallel computing resources to speed up algorithms in current multi-...
Instruction-set extension (ISE) has been widely studied as a means to improve the performance of mic...
Various algorithms for public-key cryptography, such as the Rivest–Shamir–Adleman or Diffie–Hellman ...
Cryptography can be considered as a special application of coding schemes. High speed execution of E...
Abstract--Cryptographic algorithms are important components in secure systems. We propose PAX, a tin...
With more computing platforms connected to the Internet each day, computer system security has becom...
Modern multiprocessor systems offer advanced synchronization primitives, built in hardware, to suppo...
Abstract — The increasing importance of secure information processing in publicly accessible Interne...
To achieve pervasive secure information processing over the public wired and wireless Internet, it i...
The workload of computers has changed dramatically. New user requirements include the increasing nee...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
We propose two new instructions, swperm and sieve, that can be used to efficiently complete an arbit...
Encryption is being used more than ever before. It is used to prevent eavesdropping on our communica...
Cryptographic algorithms, although being secure in theoretical construction, have many practical imp...
The pursuit of secure computation has always featured a tension between performance and security. Se...
Abstract. The effective use of parallel computing resources to speed up algorithms in current multi-...
Instruction-set extension (ISE) has been widely studied as a means to improve the performance of mic...
Various algorithms for public-key cryptography, such as the Rivest–Shamir–Adleman or Diffie–Hellman ...
Cryptography can be considered as a special application of coding schemes. High speed execution of E...
Abstract--Cryptographic algorithms are important components in secure systems. We propose PAX, a tin...
With more computing platforms connected to the Internet each day, computer system security has becom...
Modern multiprocessor systems offer advanced synchronization primitives, built in hardware, to suppo...