Modern digital communication relies heavily on cryptographic protection to ensure data integrity and privacy. In order to deploy state-of-the art cryptographic primitives and protocols in real-world scenarios, one needs to highly optimize software for both speed and security. This requires careful choices of high-level cryptographic parameters, low-level optimization of software on the assembly level for a given microarchitecture and the subtle interactions between high-level and low-level optimizations. This thesis considers three examples of cryptographic primitives and describes software implementations of these primitives that set new speed records. The Advanced Encryption Standard (AES) is one of the most widely used symmetric cryptogr...
In general, cryptographic methods are very intensive on memory and computing power. The reason for t...
This paper is the first to investigate the power of the Cell Broadband Engine for state-of-the-art p...
Elliptic curve cryptography invented in the 1980's and the Advanced Encryption Standard (AES) standa...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
For the last decade, Elliptic Curve Cryptography (ECC) has gained increasing acceptance in the indus...
This paper presents new software speed records for the computation of cryptographic pairings. More s...
The vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags ...
Cryptography can be considered as a special application of coding schemes. High speed execution of E...
This paper is the first to investigate the power of the Cell Broadband Engine for state-of-the-art p...
This paper is the first to investigate the power of the Cell Broadband Engine for state-of-the-art p...
This paper is the first to investigate the power of the Cell Broadband Engine for state-of-the-art p...
This paper is the first to investigate the power of the Cell Broadband Engine for state-of-the-art p...
This paper is the first to investigate the power of the Cell Broadband Engine for state-of-the-art p...
This paper is the first to investigate the power of the Cell Broadband Engine for state-of-the-art p...
This paper is the first to investigate the power of the Cell Broadband Engine for state-of-the-art p...
In general, cryptographic methods are very intensive on memory and computing power. The reason for t...
This paper is the first to investigate the power of the Cell Broadband Engine for state-of-the-art p...
Elliptic curve cryptography invented in the 1980's and the Advanced Encryption Standard (AES) standa...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
For the last decade, Elliptic Curve Cryptography (ECC) has gained increasing acceptance in the indus...
This paper presents new software speed records for the computation of cryptographic pairings. More s...
The vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags ...
Cryptography can be considered as a special application of coding schemes. High speed execution of E...
This paper is the first to investigate the power of the Cell Broadband Engine for state-of-the-art p...
This paper is the first to investigate the power of the Cell Broadband Engine for state-of-the-art p...
This paper is the first to investigate the power of the Cell Broadband Engine for state-of-the-art p...
This paper is the first to investigate the power of the Cell Broadband Engine for state-of-the-art p...
This paper is the first to investigate the power of the Cell Broadband Engine for state-of-the-art p...
This paper is the first to investigate the power of the Cell Broadband Engine for state-of-the-art p...
This paper is the first to investigate the power of the Cell Broadband Engine for state-of-the-art p...
In general, cryptographic methods are very intensive on memory and computing power. The reason for t...
This paper is the first to investigate the power of the Cell Broadband Engine for state-of-the-art p...
Elliptic curve cryptography invented in the 1980's and the Advanced Encryption Standard (AES) standa...