GPU is widely used in various applications that require huge computational power. In this paper, we contribute to the cryptography and high performance computing research community by presenting techniques to accelerate symmetric block ciphers (AES-128, CAST-128, Camellia, SEED, IDEA, Blowfish and Threefish) in NVIDIA GTX 980 with Maxwell architecture. The proposed techniques consider various aspects of block cipher implementation in GPU, including the placement of encryption keys and T-box in memory, thread block size, cipher operating mode, parallel granularity and data copy between CPU and GPU. We proposed a new method to store the encryption keys in registers with high access speed and exchange it with other threads by using the warp sh...
The Advanced Encryption Standard (AES) is One of the most popular symmetric block cipher because it ...
Abstract. We introduce a CUDA GPU library to accelerate evaluations with homomorphic schemes defined...
Abstract. The technical analysis used in determining which of the NESSIE candidates will be selected...
With the emergence of IoT and cloud computing technologies, massive data are generated from various ...
Recently, GPU is widely accepted in research community as an effective accelerator to many existing ...
With the advent of the Internet of Things (IoT) and cloud computing technologies, vast amounts of da...
In this paper we present GPU based implementations of popular encryption schemes Blowfish and the Ad...
One frequently cited reason for the lack of wide deployment of cryptographic protocols is the (perce...
With the proliferation of the internet of things (IoT) and device-to-device (D2D) communications ena...
ISBN 978-1-4577-1416-0International audienceHigh-bandwidth secure channels require a lot of computin...
Graphics processing units (GPUs) are specially designed for parallel applications and perform parall...
International audienceData confidentiality is one of the most critical security services. Many encry...
We study the feasibility of using Graphics Processing Units (GPUs) for cryptographic processing, by ...
The ease of programming offered by the CUDA programming model attracted a lot of programmers to try ...
International audienceData Confidentiality (DC) is considered one of the most important security ser...
The Advanced Encryption Standard (AES) is One of the most popular symmetric block cipher because it ...
Abstract. We introduce a CUDA GPU library to accelerate evaluations with homomorphic schemes defined...
Abstract. The technical analysis used in determining which of the NESSIE candidates will be selected...
With the emergence of IoT and cloud computing technologies, massive data are generated from various ...
Recently, GPU is widely accepted in research community as an effective accelerator to many existing ...
With the advent of the Internet of Things (IoT) and cloud computing technologies, vast amounts of da...
In this paper we present GPU based implementations of popular encryption schemes Blowfish and the Ad...
One frequently cited reason for the lack of wide deployment of cryptographic protocols is the (perce...
With the proliferation of the internet of things (IoT) and device-to-device (D2D) communications ena...
ISBN 978-1-4577-1416-0International audienceHigh-bandwidth secure channels require a lot of computin...
Graphics processing units (GPUs) are specially designed for parallel applications and perform parall...
International audienceData confidentiality is one of the most critical security services. Many encry...
We study the feasibility of using Graphics Processing Units (GPUs) for cryptographic processing, by ...
The ease of programming offered by the CUDA programming model attracted a lot of programmers to try ...
International audienceData Confidentiality (DC) is considered one of the most important security ser...
The Advanced Encryption Standard (AES) is One of the most popular symmetric block cipher because it ...
Abstract. We introduce a CUDA GPU library to accelerate evaluations with homomorphic schemes defined...
Abstract. The technical analysis used in determining which of the NESSIE candidates will be selected...