Abstract--Cryptographic algorithms are important components in secure systems. We propose PAX, a tiny processor for both symmetric-key and public-key ciphers. PAX’s goal is to provide the flexibility of software implementations, with performance comparable to hardware implementations for important ciphers. Based on workload characterization studies, we propose a few powerful instructions that provide huge speedups for critical operations found in many symmetric-key and public-key ciphers. A novel Parallel Table Lookup instruction enables multiple tables to be accessed in parallel by a single instruction; it also combines these parallel table results in a unique combinatorial tree. We achieve a software implementation of AES-128 in just 22 c...
Part 2: Security EngineeringInternational audienceEfficient algorithms for binary field operations a...
Part 2: Security EngineeringInternational audienceEfficient algorithms for binary field operations a...
Abstract — This paper presents a hybrid hardware-software implementation of the AES encryption algor...
Encryption is being used more than ever before. It is used to prevent eavesdropping on our communica...
This paper evaluates the area and performance overhead of a programmable cryptographic accelerator s...
This paper focuses on the performance of cryptographic algorithms on modern par-allel computers. I b...
Table lookups are one of the most frequently-used operations in symmetric-key ciphers. Particularly ...
Abstract- By exploring different granularities of data-level and task-level parallelism, we map 4 im...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
Cryptography is the study of mathematical techniques related to aspects of information security such...
Modern digital communication relies heavily on cryptographic protection to ensure data integrity and...
Cryptography is an important in security purpose applications. This paper contributes the complex pa...
The vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags ...
We present HBSH, a simple construction for tweakable length-preserving encryption which supports the...
We describe a datapath-scalable, minimalist cryptographic processor, called PAX, for mobile environm...
Part 2: Security EngineeringInternational audienceEfficient algorithms for binary field operations a...
Part 2: Security EngineeringInternational audienceEfficient algorithms for binary field operations a...
Abstract — This paper presents a hybrid hardware-software implementation of the AES encryption algor...
Encryption is being used more than ever before. It is used to prevent eavesdropping on our communica...
This paper evaluates the area and performance overhead of a programmable cryptographic accelerator s...
This paper focuses on the performance of cryptographic algorithms on modern par-allel computers. I b...
Table lookups are one of the most frequently-used operations in symmetric-key ciphers. Particularly ...
Abstract- By exploring different granularities of data-level and task-level parallelism, we map 4 im...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
Cryptography is the study of mathematical techniques related to aspects of information security such...
Modern digital communication relies heavily on cryptographic protection to ensure data integrity and...
Cryptography is an important in security purpose applications. This paper contributes the complex pa...
The vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags ...
We present HBSH, a simple construction for tweakable length-preserving encryption which supports the...
We describe a datapath-scalable, minimalist cryptographic processor, called PAX, for mobile environm...
Part 2: Security EngineeringInternational audienceEfficient algorithms for binary field operations a...
Part 2: Security EngineeringInternational audienceEfficient algorithms for binary field operations a...
Abstract — This paper presents a hybrid hardware-software implementation of the AES encryption algor...