The ever-increasing need for securing computing systems using cryptographic algorithms is spurring interest in the efficient implementation of common algorithms. While the algorithms can be implemented in software using base instruction sets, there is considerable potential to reduce memory cost and improve speed using specialized instructions and associated hardware. However, there is a need to assess the benefits and costs of software implementations and new instructions that implement key cryptographic algorithms in fewer cycles. The primary aim of this paper is to improve the understanding of the performance and cost of implementing cryptographic algorithms for the RISC-V instruction set architecture (ISA) in two cases: software impleme...
U ovome radu su analizirani podaci koji su dobiveni mjerenjem vremena izvođenja algoritama za kripti...
Abstract — Tiled architectures are emerging as an architectural platform that allows high levels of ...
Cryptography is the study of mathematical techniques related to aspects of information security such...
The ever-increasing need for securing computing systems using cryptographic algorithms is spurring i...
The purpose of this thesis is to design and implement specialized instructions for RISC-V instructio...
Cryptographic algorithms, although being secure in theoretical construction, have many practical imp...
A major challenge when applying cryptography on constrained environments is the trade-off between pe...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
Nowadays the need of speed in cipher and decipher operations is more important than in the past. Thi...
Instruction-set extension (ISE) has been widely studied as a means to improve the performance of mic...
The workload of computers has changed dramatically. New user requirements include the increasing nee...
Cryptography can be considered as a special application of coding schemes. High speed execution of E...
The selection of a Lightweight Cryptography (LWC) algorithm is crucial for resource limited applicat...
The goal of the paper is to discuss some possibilities of effective implementing cryptographic algor...
Hardware implementations of cryptographic algorithms are ubiquitous in contemporary computer systems...
U ovome radu su analizirani podaci koji su dobiveni mjerenjem vremena izvođenja algoritama za kripti...
Abstract — Tiled architectures are emerging as an architectural platform that allows high levels of ...
Cryptography is the study of mathematical techniques related to aspects of information security such...
The ever-increasing need for securing computing systems using cryptographic algorithms is spurring i...
The purpose of this thesis is to design and implement specialized instructions for RISC-V instructio...
Cryptographic algorithms, although being secure in theoretical construction, have many practical imp...
A major challenge when applying cryptography on constrained environments is the trade-off between pe...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
Nowadays the need of speed in cipher and decipher operations is more important than in the past. Thi...
Instruction-set extension (ISE) has been widely studied as a means to improve the performance of mic...
The workload of computers has changed dramatically. New user requirements include the increasing nee...
Cryptography can be considered as a special application of coding schemes. High speed execution of E...
The selection of a Lightweight Cryptography (LWC) algorithm is crucial for resource limited applicat...
The goal of the paper is to discuss some possibilities of effective implementing cryptographic algor...
Hardware implementations of cryptographic algorithms are ubiquitous in contemporary computer systems...
U ovome radu su analizirani podaci koji su dobiveni mjerenjem vremena izvođenja algoritama za kripti...
Abstract — Tiled architectures are emerging as an architectural platform that allows high levels of ...
Cryptography is the study of mathematical techniques related to aspects of information security such...