Instruction for accelerating SNOW 3G wireless security algorithm

GM Wolrich, V Gopal, E Ozturk, KS Yap… - US Patent …, 2018 - Google Patents
Vector instructions for performing SNOW 3G wireless security operations are received and
executed by the execution circuitry of a processor. The execution circuitry receives a first …

[PDF][PDF] Investigating TERO for hardware Trojan horse detection

P Kitsos, AG Voyiatzis - Computer, 2010 - artemiosv.info
The Transient Effect Ring Oscillator (TERO) was initially proposed for TRNG designs and
lately for implementing Physically Uncloneable Function (PUF) designs. In this work, the …

A Secure Mobile Platform for Intelligent Transportation Systems

A Rivero-García, I Santos-González… - … Joint Conference SOCO' …, 2017 - Springer
The number of vehicles around the world has increased a lot during the last decades and
will continue to grow in the next years. This factor is closely related to the increase of air …

Design and Implementation of Snow3G on FPGA Supporting f8, f9 Algorithm

C SHEN, S LI - Microelectronics & Computer, 2015 - journalmc.com
Algorithms for confidentiality f8 and integrity f9 have been widely applied to the security of
mobile communication network. However, the performance of f8 and f9 nowadays still …

[图书][B] Hardware implementations for symmetric key cryptosystems

H El-Razouk - 2015 - search.proquest.com
The utilization of global communications network for supporting now electronic applications
is growing. Many applications provided over the global communications network involve …

Análisis e implementación del generador SNOW 3G utilizado en las comunicaciones 4G

La cuarta generación de telefonía móvil, comercializada como tecnología 4G, y conocida
como LTE (Long Term Evolution) o su versión mejorada LTE-A (LTE-Advanced), se está …

VLSI design of a quaternary carry ripple adder

HM Razavi, T Kaylani - … The Twenty-First Southeastern Symposium on …, 1989 - computer.org
Nowadays, most communications are centralized. In emergency or catastrophic situations,
this could be a problem because common communication infrastructures could collapse or …

Manual Optimizations for Efficient Designs

A Khalid, G Paul, A Chattopadhyay, A Khalid… - Domain Specific High …, 2019 - Springer
Requirement of very high performance (runtime) coupled with limited energy budgets
naturally lead to the inclusion of cryptographic accelerators in today's heterogeneous …

[PDF][PDF] Secure Indoor Positioning System based on Inertial Measurements for Low Cost Devices

I Santos-González, A Rivero-Garcıa, P Caballero-Gil… - ICDS 2018, 2018 - researchgate.net
This work describes an alternative solution for the problem of indoor location in places
where the use of GPS devices is either impossible or not precise enough. The new proposal …

[PDF][PDF] An FPGA Implementation of ZUC Stream Cipher

MB SS, SB Rahane - academia.edu
In this paper a hardware implementation of ZUC stream cipher is presented. ZUC is a stream
cipher that forms the heart to the 3 GPP confidentiality algorithm 128-EEA3 and the 3GPP …