Abstract — The increasing importance of secure information processing in publicly accessible Internet and wireless networks poses new challenges in the architecture of future general-purpose processors. Symmetric-key cryptography algorithms are an important class of algorithms used to achieve confidentiality. Many of them use a category of operations that are not well supported by today’s word-oriented microprocessors: bit-oriented permutations. In this paper, we show how arbitrary bit permutations within a word can be achieved in just one or two cycles. This improves upon the O(n) instructions needed to achieve any one of n! permutations of n bits in existing RISC processors; it also improves upon recent work that achieves this in O(log(n)...
. Large families of permutations and a generator of pseudorandom sequences of binary words are imple...
Abstract- Several bit permutation instructions, including GRP, OMFLIP, CROSS, and BFLY, have been pr...
Various algorithms for public-key cryptography, such as the Rivest–Shamir–Adleman or Diffie–Hellman ...
The workload of computers has changed dramatically. New user requirements include the increasing nee...
To achieve pervasive secure information processing over the public wired and wireless Internet, it i...
We propose two new instructions, swperm and sieve, that can be used to efficiently complete an arbit...
Abstract. We examine secure computing paradigms to identify any new architectural challenges for fut...
Permutation is widely used in cryptographic algorithms. However, it is not well-supported in existin...
Most of the cryptographic protocols that we use frequently on the internet are designed in a fashion...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
We present HBSH, a simple construction for tweakable length-preserving encryption which supports the...
In this paper, a new efficient VLSI architecture to compute modular exponentiation and modular multi...
Permutation-based symmetric cryptography has become increasingly popular over the past ten years, es...
Abstract. We propose Chaskey: a very efficient Message Authentication Code (MAC) algorithm for 32-bi...
The ever-increasing need for securing computing systems using cryptographic algorithms is spurring i...
. Large families of permutations and a generator of pseudorandom sequences of binary words are imple...
Abstract- Several bit permutation instructions, including GRP, OMFLIP, CROSS, and BFLY, have been pr...
Various algorithms for public-key cryptography, such as the Rivest–Shamir–Adleman or Diffie–Hellman ...
The workload of computers has changed dramatically. New user requirements include the increasing nee...
To achieve pervasive secure information processing over the public wired and wireless Internet, it i...
We propose two new instructions, swperm and sieve, that can be used to efficiently complete an arbit...
Abstract. We examine secure computing paradigms to identify any new architectural challenges for fut...
Permutation is widely used in cryptographic algorithms. However, it is not well-supported in existin...
Most of the cryptographic protocols that we use frequently on the internet are designed in a fashion...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
We present HBSH, a simple construction for tweakable length-preserving encryption which supports the...
In this paper, a new efficient VLSI architecture to compute modular exponentiation and modular multi...
Permutation-based symmetric cryptography has become increasingly popular over the past ten years, es...
Abstract. We propose Chaskey: a very efficient Message Authentication Code (MAC) algorithm for 32-bi...
The ever-increasing need for securing computing systems using cryptographic algorithms is spurring i...
. Large families of permutations and a generator of pseudorandom sequences of binary words are imple...
Abstract- Several bit permutation instructions, including GRP, OMFLIP, CROSS, and BFLY, have been pr...
Various algorithms for public-key cryptography, such as the Rivest–Shamir–Adleman or Diffie–Hellman ...