We propose two new instructions, swperm and sieve, that can be used to efficiently complete an arbitrary bit-level permutation of an-bit word with or without repetitions. Permutations with repetitions are rearrangements of an ordered set in which elements may replace other elements in the set; such permutations are useful in cryptographic algorithms. On a four-way superscalar processor, we can complete an arbitrary 64-bit permutation with repetitions of 1-bit subwords in 11 instructions and only four cycles using the two proposed instructions. For subwords of size 4 bits or greater, we can perform an arbitrary permutation with repetitions of a 64-bit register in a single cycle using a single swperm instruction. This improves upon previous r...
In this work, we propose a construction of 2-round tweakable substitutionpermutation networks using ...
Abstract. The domain of lightweight cryptography focuses on crypto-graphic algorithms for extremely ...
Lightweight block ciphers rely on simple operations to allow compact implementation. Thanks to its e...
Abstract — The increasing importance of secure information processing in publicly accessible Interne...
To achieve pervasive secure information processing over the public wired and wireless Internet, it i...
Permutation is widely used in cryptographic algorithms. However, it is not well-supported in existin...
The workload of computers has changed dramatically. New user requirements include the increasing nee...
Abstract. We examine secure computing paradigms to identify any new architectural challenges for fut...
The problem of storing permutations in a distributed manner arises in several common scenarios, such...
Abstract- Several bit permutation instructions, including GRP, OMFLIP, CROSS, and BFLY, have been pr...
The traditional permutation multiplication algorithm is now limited by memory latency and not by CPU...
Abstract. In this paper we describe a fast new DES implementation. This implementation is about ve t...
Abstract--Cryptographic algorithms are important components in secure systems. We propose PAX, a tin...
Abstract. The domain of lightweight cryptography focuses on crypto-graphic algorithms for extremely ...
We present HBSH, a simple construction for tweakable length-preserving encryption which supports the...
In this work, we propose a construction of 2-round tweakable substitutionpermutation networks using ...
Abstract. The domain of lightweight cryptography focuses on crypto-graphic algorithms for extremely ...
Lightweight block ciphers rely on simple operations to allow compact implementation. Thanks to its e...
Abstract — The increasing importance of secure information processing in publicly accessible Interne...
To achieve pervasive secure information processing over the public wired and wireless Internet, it i...
Permutation is widely used in cryptographic algorithms. However, it is not well-supported in existin...
The workload of computers has changed dramatically. New user requirements include the increasing nee...
Abstract. We examine secure computing paradigms to identify any new architectural challenges for fut...
The problem of storing permutations in a distributed manner arises in several common scenarios, such...
Abstract- Several bit permutation instructions, including GRP, OMFLIP, CROSS, and BFLY, have been pr...
The traditional permutation multiplication algorithm is now limited by memory latency and not by CPU...
Abstract. In this paper we describe a fast new DES implementation. This implementation is about ve t...
Abstract--Cryptographic algorithms are important components in secure systems. We propose PAX, a tin...
Abstract. The domain of lightweight cryptography focuses on crypto-graphic algorithms for extremely ...
We present HBSH, a simple construction for tweakable length-preserving encryption which supports the...
In this work, we propose a construction of 2-round tweakable substitutionpermutation networks using ...
Abstract. The domain of lightweight cryptography focuses on crypto-graphic algorithms for extremely ...
Lightweight block ciphers rely on simple operations to allow compact implementation. Thanks to its e...