Recently, GPU is widely accepted in research community as an effective accelerator to many existing algorithms. In this paper, we contribute to the cryptography research community by presenting high speed implementation of symmetric block ciphers in GPU platform. We implemented Camellia, CAST5 and SEED in NVIDIA GTX680 and present the details of implementation techniques together with benchmarking results against existing solutions. According to the evaluation result, we are able to achieve throughput of 61.1 Gbps, 45.5 Gbps and 47.4 Gbps for Camellia, CAST5 and SEED accordingly, without considering the data transfer between CPU and GPU. By considering the data transfer, the throughput for Camellia, CAST5 and SEED dropped to 44.9 Gbps, 40.5...
The ease of programming offered by the CUDA programming model attracted a lot of programmers to try ...
Cryptography, the science of writing secrets, has been used for centuries to conceal information fro...
The technical analysis used in determining which of the NESSIE candidates will be selected as a stan...
GPU is widely used in various applications that require huge computational power. In this paper, we ...
With the emergence of IoT and cloud computing technologies, massive data are generated from various ...
With the advent of the Internet of Things (IoT) and cloud computing technologies, vast amounts of da...
In this paper we present GPU based implementations of popular encryption schemes Blowfish and the Ad...
ISBN 978-1-4577-1416-0International audienceHigh-bandwidth secure channels require a lot of computin...
One frequently cited reason for the lack of wide deployment of cryptographic protocols is the (perce...
With the proliferation of the internet of things (IoT) and device-to-device (D2D) communications ena...
We study the feasibility of using Graphics Processing Units (GPUs) for cryptographic processing, by ...
Subject of Research. The paper deals with the research of transformations used in up-to-date symmetr...
International audienceData confidentiality is one of the most critical security services. Many encry...
Graphics processing units (GPUs) are specially designed for parallel applications and perform parall...
International audienceData Confidentiality (DC) is considered one of the most important security ser...
The ease of programming offered by the CUDA programming model attracted a lot of programmers to try ...
Cryptography, the science of writing secrets, has been used for centuries to conceal information fro...
The technical analysis used in determining which of the NESSIE candidates will be selected as a stan...
GPU is widely used in various applications that require huge computational power. In this paper, we ...
With the emergence of IoT and cloud computing technologies, massive data are generated from various ...
With the advent of the Internet of Things (IoT) and cloud computing technologies, vast amounts of da...
In this paper we present GPU based implementations of popular encryption schemes Blowfish and the Ad...
ISBN 978-1-4577-1416-0International audienceHigh-bandwidth secure channels require a lot of computin...
One frequently cited reason for the lack of wide deployment of cryptographic protocols is the (perce...
With the proliferation of the internet of things (IoT) and device-to-device (D2D) communications ena...
We study the feasibility of using Graphics Processing Units (GPUs) for cryptographic processing, by ...
Subject of Research. The paper deals with the research of transformations used in up-to-date symmetr...
International audienceData confidentiality is one of the most critical security services. Many encry...
Graphics processing units (GPUs) are specially designed for parallel applications and perform parall...
International audienceData Confidentiality (DC) is considered one of the most important security ser...
The ease of programming offered by the CUDA programming model attracted a lot of programmers to try ...
Cryptography, the science of writing secrets, has been used for centuries to conceal information fro...
The technical analysis used in determining which of the NESSIE candidates will be selected as a stan...