Abstract—Fast stream ciphers are used extensively for en-crypted data transmission in mobile networks and over multi-gigabit links. CryptMT, a recently proposed stream cipher, is one of the final candidates for standardization by the European Union’s eSTREAM project. Cryptanalysis of CryptMT has dis-covered no feasible attacks thus far. We present a scalable technique for parallelizing CryptMT and present an area-efficient hardware implementation on a field-programmable gate array (FPGA). On the Xilinx Virtex-2 Pro FPGA, a 2 × parallelization delivers throughputs of up to 16 Gbits/s while using minimal logic resources (1,782 slices). This is highly area-efficient compared to implementations of ciphers such as AES. Possibilities for higher d...
A cryptanalytic time-memory tradeoff allows the cryptanalysis of any N key symmetric cryptosystem in...
Embedded hardware security has been an increasingly important need for many modern general and speci...
A cryptanalytic time-memory tradeoff allows the cryptanal- ysis of any N key symmetric cryptosystem ...
The technical analysis used in determining which of the NESSIE candidates will be selected as a stan...
Stream ciphers have the reputation to be very efficient when implemented in hardware, much more effi...
NESSIE is a 3-year research project (2000-2002). The goal of the project is to put forward some algo...
Abstract. The technical analysis used in determining which of the NESSIE candidates will be selected...
The information security is one of the most important issues in the design of any communication netw...
Each day, millions of users generate and interchange large volumes of information in various fields....
Stream ciphers have the reputation to be very efficient when implemented in hardware, much more effi...
Abstract. Efficient cryptographic implementations are a fundamental factor in the achievement and di...
Abstract. Rabbit is a software-oriented synchronous stream cipher with very strong security properti...
Cryptography is the only practical method for protecting information transmitted through communicati...
NESSIE is a 3-year research project (2000-2002). The goal of the project is to put forward some algo...
Hardware implementations of cryptographic algorithms are ubiquitous in contemporary computer systems...
A cryptanalytic time-memory tradeoff allows the cryptanalysis of any N key symmetric cryptosystem in...
Embedded hardware security has been an increasingly important need for many modern general and speci...
A cryptanalytic time-memory tradeoff allows the cryptanal- ysis of any N key symmetric cryptosystem ...
The technical analysis used in determining which of the NESSIE candidates will be selected as a stan...
Stream ciphers have the reputation to be very efficient when implemented in hardware, much more effi...
NESSIE is a 3-year research project (2000-2002). The goal of the project is to put forward some algo...
Abstract. The technical analysis used in determining which of the NESSIE candidates will be selected...
The information security is one of the most important issues in the design of any communication netw...
Each day, millions of users generate and interchange large volumes of information in various fields....
Stream ciphers have the reputation to be very efficient when implemented in hardware, much more effi...
Abstract. Efficient cryptographic implementations are a fundamental factor in the achievement and di...
Abstract. Rabbit is a software-oriented synchronous stream cipher with very strong security properti...
Cryptography is the only practical method for protecting information transmitted through communicati...
NESSIE is a 3-year research project (2000-2002). The goal of the project is to put forward some algo...
Hardware implementations of cryptographic algorithms are ubiquitous in contemporary computer systems...
A cryptanalytic time-memory tradeoff allows the cryptanalysis of any N key symmetric cryptosystem in...
Embedded hardware security has been an increasingly important need for many modern general and speci...
A cryptanalytic time-memory tradeoff allows the cryptanal- ysis of any N key symmetric cryptosystem ...