In 2013 Intel will release the AVX2 instructions, which introduce 256-bit single-instruction multiple-data (SIMD) integer arithmetic. This will enable desktop and server processors from this vendor to support 4-way SIMD computation of 64-bit add-rotate-xor algorithms, as well as 8-way 32-bit SIMD computations. AVX2 also includes interesting instructions for cryptographic functions, like any-to-any permute and vectorized table-lookup. In this paper, we explore the potential of AVX2 to speed-up the SHA-3 finalist BLAKE, and present the first working assembly implementations of BLAKE-256 and BLAKE-512 with AVX2. We then investigate the potential of the recent AVX and XOP instructions to accelerate BLAKE, and report new speed records on Sandy B...
Recent cryptanalysis on SHA-1 family has led the NIST to call for a public competition named SHA-3 C...
Single-Instruction-Multiple-Data (SIMD) extensions like Intel's AVX2 o er a great potential to accel...
Hashing functions play a fundamental role in modern cryptography. Such functions process data of fin...
We present new software speed records for several popular hash functions on low-end 8-bit AVR microc...
Abstract—Cryptographic hash functions are used to protect information integrity and authenticity in ...
peer reviewedSHA-512 is a member of the SHA-2 family of cryptographic hash algorithms that is based ...
Information is an asset in today’s life. Internet plays major role for sharing the information betwe...
In contemporary computer systems security issues are very important for both safety and reliability ...
BLAKE is a cryptographic hash function proposed as a candidate in SHA-3 contest where he successfull...
Graduation date: 2005The SIMD (single-instruction, multiple-data) architecture is implemented in man...
With process technology providing more and more transistors per chip, still following Moore's \law",...
Encryption is being used more than ever before. It is used to prevent eavesdropping on our communica...
j-lanes hashing is a tree mode that splits an input message to j slices, computes j independent dige...
The enormous growth of the Internet of Things (IoT) in the recent past has fueled a strong demand fo...
Abstract — Cryptographic hash functions are used widely in many applications mainly for its high spe...
Recent cryptanalysis on SHA-1 family has led the NIST to call for a public competition named SHA-3 C...
Single-Instruction-Multiple-Data (SIMD) extensions like Intel's AVX2 o er a great potential to accel...
Hashing functions play a fundamental role in modern cryptography. Such functions process data of fin...
We present new software speed records for several popular hash functions on low-end 8-bit AVR microc...
Abstract—Cryptographic hash functions are used to protect information integrity and authenticity in ...
peer reviewedSHA-512 is a member of the SHA-2 family of cryptographic hash algorithms that is based ...
Information is an asset in today’s life. Internet plays major role for sharing the information betwe...
In contemporary computer systems security issues are very important for both safety and reliability ...
BLAKE is a cryptographic hash function proposed as a candidate in SHA-3 contest where he successfull...
Graduation date: 2005The SIMD (single-instruction, multiple-data) architecture is implemented in man...
With process technology providing more and more transistors per chip, still following Moore's \law",...
Encryption is being used more than ever before. It is used to prevent eavesdropping on our communica...
j-lanes hashing is a tree mode that splits an input message to j slices, computes j independent dige...
The enormous growth of the Internet of Things (IoT) in the recent past has fueled a strong demand fo...
Abstract — Cryptographic hash functions are used widely in many applications mainly for its high spe...
Recent cryptanalysis on SHA-1 family has led the NIST to call for a public competition named SHA-3 C...
Single-Instruction-Multiple-Data (SIMD) extensions like Intel's AVX2 o er a great potential to accel...
Hashing functions play a fundamental role in modern cryptography. Such functions process data of fin...