AES (Advanced Encryption Standard) accelerators are commonly used in high-throughput applications, but they have notable resource requirements. We investigate replacing the AES cipher with ChaCha ciphers and propose the first ChaCha FPGA implementations optimized for data throughput. In consequence, we compare implementations of three different system architectures and analyze which aspects dominate the performance of those.Our experimental results indicate that a bandwidth of 175 Gbit/s can be reached with as little as 2982 slices, whereas comparable state of the art AES accelerators require 10 times as many slices. Taking advantage of the flexibility inherent in the ChaCha cipher, we also demonstrate how our implementation scales to even ...
Performance evaluation of the Advanced Encryption Standard candidates has led to intensive study of ...
AbstractOver the past few years, cryptographic algorithms have become increasingly important. Advanc...
Authenticated ciphers offer potential benefits to resource-constrained devices in the Internet of Th...
The technical analysis used in determining which of the NESSIE candidates will be selected as a stan...
Abstract—Tweakable enciphering schemes are length-preserving block cipher modes of operation that pr...
With the rapid growth of the Internet and digital communications, the volume of sensitive electronic...
The growth of computer systems and electronic communications and transactions has meant that the nee...
The Rijndael cipher, designed by Joan Daemen and Vincent Rijmen and recently selected as the officia...
The Rijndael cipher, designed by Joan Daemen and Vincent Rijmen and recently selected as the officia...
NESSIE is a 3-year research project (2000-2002). The goal of the project is to put forward some algo...
The growth of computer systems and electronic communications and transactions has meant that the ne...
The demand for data exchange is ever growing. Internet of Things (IoT), industry 4.0, smart city and...
The demand for data exchange is ever growing. Internet of Things (IoT), industry 4.0, smart city and...
The demand for data exchange is ever growing. Internet of Things (IoT), industry 4.0, smart city and...
Hardware implementations of cryptographic algorithms are ubiquitous in contemporary computer systems...
Performance evaluation of the Advanced Encryption Standard candidates has led to intensive study of ...
AbstractOver the past few years, cryptographic algorithms have become increasingly important. Advanc...
Authenticated ciphers offer potential benefits to resource-constrained devices in the Internet of Th...
The technical analysis used in determining which of the NESSIE candidates will be selected as a stan...
Abstract—Tweakable enciphering schemes are length-preserving block cipher modes of operation that pr...
With the rapid growth of the Internet and digital communications, the volume of sensitive electronic...
The growth of computer systems and electronic communications and transactions has meant that the nee...
The Rijndael cipher, designed by Joan Daemen and Vincent Rijmen and recently selected as the officia...
The Rijndael cipher, designed by Joan Daemen and Vincent Rijmen and recently selected as the officia...
NESSIE is a 3-year research project (2000-2002). The goal of the project is to put forward some algo...
The growth of computer systems and electronic communications and transactions has meant that the ne...
The demand for data exchange is ever growing. Internet of Things (IoT), industry 4.0, smart city and...
The demand for data exchange is ever growing. Internet of Things (IoT), industry 4.0, smart city and...
The demand for data exchange is ever growing. Internet of Things (IoT), industry 4.0, smart city and...
Hardware implementations of cryptographic algorithms are ubiquitous in contemporary computer systems...
Performance evaluation of the Advanced Encryption Standard candidates has led to intensive study of ...
AbstractOver the past few years, cryptographic algorithms have become increasingly important. Advanc...
Authenticated ciphers offer potential benefits to resource-constrained devices in the Internet of Th...