The aim of this thesis was to determine the execution times of different cryptographic algorithms in one of the hardware used in Asha families and compare the execution times between HW accelerated, OpenSSL and a company proprietary cryptographic library. Moreover, the motivation was to find out if the HW accelerated cryptographic function should be used when available due to execution time. Furthermore the aim was to find out if the transition to use OpenSSL is to be preferred in terms of the execution times over the company proprietary cryptographic library. In order to give wider perspective of the cryptography the thesis introduces a brief history of the cryptography. The following cryptographic functions are discussed in the thesis: h...
This paper focuses on the performance of cryptographic algorithms on modern par-allel computers. I b...
Currently, there are billions of IoT devices connected to each other through the internet, and manuf...
The goal of the paper is to discuss some possibilities of effective implementing cryptographic algor...
It is clear that Cryptography is computationally intensive. It is also known that embedded systems h...
This paper runs an evaluation of cryptographic algorithms (block ciphers and public key ciphers) in ...
Abstract. Limited computational power imposes new challenges during the implementation of security a...
Cryptography can be considered as a special application of coding schemes. High speed execution of E...
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. C...
With technology evolving rapidly and proliferating, it is imperative to pay attention to mobile devi...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
In this paper, we study the runtime performance of symmetric cryptographic algorithms on an embedded...
The pervasive diffusion of electronic devices in security and privacy sensitive applications has boo...
International audienceCryptographic algorithms that can provide both encryption and authentication a...
Modern digital communication relies heavily on cryptographic protection to ensure data integrity and...
This paper provides an overview of the research findings related to cryptographic hardware, accelera...
This paper focuses on the performance of cryptographic algorithms on modern par-allel computers. I b...
Currently, there are billions of IoT devices connected to each other through the internet, and manuf...
The goal of the paper is to discuss some possibilities of effective implementing cryptographic algor...
It is clear that Cryptography is computationally intensive. It is also known that embedded systems h...
This paper runs an evaluation of cryptographic algorithms (block ciphers and public key ciphers) in ...
Abstract. Limited computational power imposes new challenges during the implementation of security a...
Cryptography can be considered as a special application of coding schemes. High speed execution of E...
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. C...
With technology evolving rapidly and proliferating, it is imperative to pay attention to mobile devi...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
In this paper, we study the runtime performance of symmetric cryptographic algorithms on an embedded...
The pervasive diffusion of electronic devices in security and privacy sensitive applications has boo...
International audienceCryptographic algorithms that can provide both encryption and authentication a...
Modern digital communication relies heavily on cryptographic protection to ensure data integrity and...
This paper provides an overview of the research findings related to cryptographic hardware, accelera...
This paper focuses on the performance of cryptographic algorithms on modern par-allel computers. I b...
Currently, there are billions of IoT devices connected to each other through the internet, and manuf...
The goal of the paper is to discuss some possibilities of effective implementing cryptographic algor...