With the emergence of IoT and cloud computing technologies, massive data are generated from various applications everyday and communicated through the Internet. Secure communication is essential to protect these data from malicious attacks. Block ciphers are one mechanism to offer such protection but unfortunately involve intensive computations that can be performance bottlenecks to the servers, especially when the data center needs to handle thousands of concurrent transactions. In this paper, we investigate the feasibility of the GPU as an accelerator to perform high‐speed encryption in server environments. We present optimized implementations of a conventional block cipher (AES) and new lightweight block ciphers (LEA, Chaskey, SIMON, SPE...
Accelerators, such as field programmable gate arrays (FPGAs) and graphics processing units (GPUs), a...
The advancements in computing have led to tremendous increase in the amount of data being generated ...
International audienceData confidentiality is one of the most critical security services. Many encry...
With the advent of the Internet of Things (IoT) and cloud computing technologies, vast amounts of da...
Graphics processing units (GPUs) are specially designed for parallel applications and perform parall...
GPU is widely used in various applications that require huge computational power. In this paper, we ...
With the proliferation of the internet of things (IoT) and device-to-device (D2D) communications ena...
In this paper we present GPU based implementations of popular encryption schemes Blowfish and the Ad...
International audienceIn this work we study the feasibility of high-bandwidth, secure communications...
Recently, GPU is widely accepted in research community as an effective accelerator to many existing ...
One frequently cited reason for the lack of wide deployment of cryptographic protocols is the (perce...
Many of us use encryption frequently whether realising it or not; it is the active yet often invisib...
ISBN 978-1-4577-1416-0International audienceHigh-bandwidth secure channels require a lot of computin...
Since users rely on passwords to authenticate themselves to computer systems, ad-versaries attempt t...
International audienceData Confidentiality (DC) is considered one of the most important security ser...
Accelerators, such as field programmable gate arrays (FPGAs) and graphics processing units (GPUs), a...
The advancements in computing have led to tremendous increase in the amount of data being generated ...
International audienceData confidentiality is one of the most critical security services. Many encry...
With the advent of the Internet of Things (IoT) and cloud computing technologies, vast amounts of da...
Graphics processing units (GPUs) are specially designed for parallel applications and perform parall...
GPU is widely used in various applications that require huge computational power. In this paper, we ...
With the proliferation of the internet of things (IoT) and device-to-device (D2D) communications ena...
In this paper we present GPU based implementations of popular encryption schemes Blowfish and the Ad...
International audienceIn this work we study the feasibility of high-bandwidth, secure communications...
Recently, GPU is widely accepted in research community as an effective accelerator to many existing ...
One frequently cited reason for the lack of wide deployment of cryptographic protocols is the (perce...
Many of us use encryption frequently whether realising it or not; it is the active yet often invisib...
ISBN 978-1-4577-1416-0International audienceHigh-bandwidth secure channels require a lot of computin...
Since users rely on passwords to authenticate themselves to computer systems, ad-versaries attempt t...
International audienceData Confidentiality (DC) is considered one of the most important security ser...
Accelerators, such as field programmable gate arrays (FPGAs) and graphics processing units (GPUs), a...
The advancements in computing have led to tremendous increase in the amount of data being generated ...
International audienceData confidentiality is one of the most critical security services. Many encry...