Abstract. The ESTREAM project has identified two profiles for stream ciphers: a hardware profile and a software profile. The software profile is directly applicable to many computer systems. The hardware profile, on the other hand, does not reflect a complete system design, but instead represents a stand-alone component. In this paper we consider the integration of hardware stream ciphers in software systems for the case of Trivium, Salsa20 and Phelix. We review the different categories of hardware/software interfaces and then present performance- and implementation results for several stream-cipher configurations. Our conclusion is that the wide variety of possible hardware/software interfaces has substantial impact on the resulting perfor...
In this paper, a new method of stream encoding and decoding is presented. It is developed on the bas...
This diploma’s thesis discourses the cryptographic systems and ciphers, whose function, usage and pr...
Abstract. Rabbit is a software-oriented synchronous stream cipher with very strong security properti...
Abstract. Efficient cryptographic implementations are a fundamental factor in the achievement and di...
With increasing usage of hardware accelerators in modern heterogeneous System-on-Chips (SoCs), the d...
Stream ciphers have the reputation to be very efficient when implemented in hardware, much more effi...
This thesis investigates the hardware implementation and statistical analysis of new stream ciphers,...
Stream ciphers have the reputation to be very efficient when implemented in hardware, much more effi...
Abstract — This work is motivated by the question of how effi-cient modern stream ciphers in the eST...
Cryptography is the only practical method for protecting information transmitted through communicati...
In this paper the FPGA implementations for four stream ciphers are presented. The two stream ciphers...
Abstract. In this paper, we propose a universal hardware Application Programming Interface (API) for...
The demand for low resource devices has increased rapidly due to the advancements in Internet-of-thi...
The post integration performance of cipher cores to a reconfigurable System-on-Chip is a relatively ...
Summarization: Pervasive computing constitutes a growing trend, aiming to embed smart devices into e...
In this paper, a new method of stream encoding and decoding is presented. It is developed on the bas...
This diploma’s thesis discourses the cryptographic systems and ciphers, whose function, usage and pr...
Abstract. Rabbit is a software-oriented synchronous stream cipher with very strong security properti...
Abstract. Efficient cryptographic implementations are a fundamental factor in the achievement and di...
With increasing usage of hardware accelerators in modern heterogeneous System-on-Chips (SoCs), the d...
Stream ciphers have the reputation to be very efficient when implemented in hardware, much more effi...
This thesis investigates the hardware implementation and statistical analysis of new stream ciphers,...
Stream ciphers have the reputation to be very efficient when implemented in hardware, much more effi...
Abstract — This work is motivated by the question of how effi-cient modern stream ciphers in the eST...
Cryptography is the only practical method for protecting information transmitted through communicati...
In this paper the FPGA implementations for four stream ciphers are presented. The two stream ciphers...
Abstract. In this paper, we propose a universal hardware Application Programming Interface (API) for...
The demand for low resource devices has increased rapidly due to the advancements in Internet-of-thi...
The post integration performance of cipher cores to a reconfigurable System-on-Chip is a relatively ...
Summarization: Pervasive computing constitutes a growing trend, aiming to embed smart devices into e...
In this paper, a new method of stream encoding and decoding is presented. It is developed on the bas...
This diploma’s thesis discourses the cryptographic systems and ciphers, whose function, usage and pr...
Abstract. Rabbit is a software-oriented synchronous stream cipher with very strong security properti...