NEON is a vector instruction set included in a large fraction of new ARM-based tablets and smartphones. This paper shows that NEON supports high-security cryptography at surprisingly high speeds; normally data arrives at lower speeds, giving the CPU time to handle tasks other than cryptography. In particular, this paper explains how to use a single 800MHz Cortex A8 core to compute the existing NaCl suite of high-security cryptographic primitives at the following speeds: 5.60 cycles per byte (1.14 Gbps) to encrypt using a shared secret key, 2.30 cycles per byte (2.78 Gbps) to authenticate using a shared secret key, 527102 cycles (1517/second) to compute a shared secret key for a new public key, 624846 cycles (1280/second) to verify a signatu...
advances in computing steadily erode computer security at its foundation, calling for fundamental in...
Summarization: A5 is the basic cryptographic algorithm used in GSM cell-phones to ensure that the us...
Modern digital communication relies heavily on cryptographic protection to ensure data integrity and...
NEON is a vector instruction set included in a large fraction of new ARM-based tablets and smartphon...
Recently, ARM NEON architecture has occupied a significant share of tablet and smartphone markets du...
Part 2: Security EngineeringInternational audienceEfficient algorithms for binary field operations a...
This paper focuses on the performance of cryptographic algorithms on modern par-allel computers. I b...
We present new speed records on the Armv8-A architecture for the latticebased schemes Dilithium, Kyb...
The Internet of Things (IoT) consists of an ever-growing network of wireless-connected electronic de...
With the proliferation of the internet of things (IoT) and device-to-device (D2D) communications ena...
The demand for data exchange is ever growing. Internet of Things (IoT), industry 4.0, smart city and...
High-degree, low-precision polynomial arithmetic is a fundamental computational primitive underlying...
This paper is the first to investigate the power of the Cell Broadband Engine for state-of-the-art p...
The aim of this thesis was to determine the execution times of different cryptographic algorithms in...
Cryptography can be considered as a special application of coding schemes. High speed execution of E...
advances in computing steadily erode computer security at its foundation, calling for fundamental in...
Summarization: A5 is the basic cryptographic algorithm used in GSM cell-phones to ensure that the us...
Modern digital communication relies heavily on cryptographic protection to ensure data integrity and...
NEON is a vector instruction set included in a large fraction of new ARM-based tablets and smartphon...
Recently, ARM NEON architecture has occupied a significant share of tablet and smartphone markets du...
Part 2: Security EngineeringInternational audienceEfficient algorithms for binary field operations a...
This paper focuses on the performance of cryptographic algorithms on modern par-allel computers. I b...
We present new speed records on the Armv8-A architecture for the latticebased schemes Dilithium, Kyb...
The Internet of Things (IoT) consists of an ever-growing network of wireless-connected electronic de...
With the proliferation of the internet of things (IoT) and device-to-device (D2D) communications ena...
The demand for data exchange is ever growing. Internet of Things (IoT), industry 4.0, smart city and...
High-degree, low-precision polynomial arithmetic is a fundamental computational primitive underlying...
This paper is the first to investigate the power of the Cell Broadband Engine for state-of-the-art p...
The aim of this thesis was to determine the execution times of different cryptographic algorithms in...
Cryptography can be considered as a special application of coding schemes. High speed execution of E...
advances in computing steadily erode computer security at its foundation, calling for fundamental in...
Summarization: A5 is the basic cryptographic algorithm used in GSM cell-phones to ensure that the us...
Modern digital communication relies heavily on cryptographic protection to ensure data integrity and...