Xoodyak, a lightweight cryptographic scheme

J Daemen, S Hoffert, M Peeters… - IACR Transactions on …, 2020 - icscm.ub.rub.de
In this paper, we present Xoodyak, a cryptographic primitive that can be used for hashing,
encryption, MAC computation and authenticated encryption. Essentially, it is a duplex object …

Partitioned security processor architecture on FPGA platform

R Paul, S Shukla - IET Computers & Digital Techniques, 2018 - Wiley Online Library
Internet protocol security (IPSec), secure sockets layer (SSL)/transport layer security (TLS)
and other security protocols necessitate high throughput hardware implementation of …

RC4-AccSuite: A hardware acceleration suite for RC4-like stream ciphers

A Khalid, G Paul… - IEEE Transactions on Very …, 2016 - ieeexplore.ieee.org
We present RC4-AccSuite, a hardware accelerator, which combines the flexibility of an
application specific instruction set processor and the performance of an application specific …

An area-optimized serial implementation of ICEPOLE authenticated encryption schemes

M Tempelmeier, F De Santis, JP Kaps… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
ICEPOLE is a high-speed, hardware-oriented family of authenticated encryption schemes
aimed at high-throughput data processing. It is one of the candidates admitted to the second …

SIMD instruction set extensions for keccak with applications to SHA-3, keyak and ketje

HK Rawat, P Schaumont - … of the Hardware and Architectural Support for …, 2016 - dl.acm.org
Recent processor architectures such as Intel Westmere (and later) and ARMv8 include
instruction-level support for the Advanced Encryption Standard (AES), for the Secure …

A high speed KECCAK coprocessor for partitioned NSP architecture on FPGA platform

R Paul, SK Shukla - VLSI Design and Test: 21st International Symposium …, 2017 - Springer
The messages in the latest security protocols such as IPSec, TLS and SSL must be handled
by high-speed crypto systems. Current computationally extensive cryptographic …

A hardware benchmarking platform for the standardization of authenticated encryption algorithms

MT Tempelmeier - 2021 - mediatum.ub.tum.de
This thesis describes and solves the challenges of evaluating and benchmarking hardware
implementations of Authenticated Encryption algorithms during their standardization …

Vector instruction set extensions for efficient and reliable computation of keccak

HK Rawat - 2016 - vtechworks.lib.vt.edu
Recent processor architectures such as Intel Westmere (and later) and ARMv8 include
instruction-level support for the Advanced Encryption Standard (AES), for the Secure …

Methodology for Developing Lightweight Architectures for FPGAs

PSVVK Yalla - 2017 - search.proquest.com
Until now, application specific integrated circuits (ASICs) are the main platform for
lightweight cryptography because of their low power consumption and good performance …

[引用][C] A Lightweight Authenticated Encryption Algorithm Based on Compact CLEFIA Block Cipher

M Liang, T Ji, Y Yuan, X Cheng, Z Zhang… - Journal of Circuits …, 2024 - World Scientific
This paper presents CLEFIA-Kec, a lightweight authenticated encryption algorithm that
combines CLEFIA with Keccak, for Internet of Things applications. The compact CLEFIA …