A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments

JH Kong, LM Ang, KP Seng - Journal of Network and Computer …, 2015 - Elsevier
Modern cryptographic algorithms play an irreplaceable role in data communication systems
for various areas of applications. These algorithms are the backbone of data protection and …

Apparatuses, methods, and systems for blockchain transaction acceleration

SN Peffers, SM Gulley - US Patent 10,761,877, 2020 - Google Patents
Methods and apparatuses relating to accelerating blockchain transactions are described. In
one embodiment, a processor includes a hardware accelerator to execute an operation of a …

Resource-shared crypto-coprocessor of AES Enc/Dec with SHA-3

A Khalid, A Aziz, C Wang, M O'Neill… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cryptographic co-processors are integral to the modern System-on-Chips. Flexibility in such
designs serves dual purpose, ie, it enables acceleration of different essential cryptographic …

Apparatuses and methods for frequency scaling a message scheduler data path of a hashing accelerator

V Suresh, S Mathew, S Satpathy - US Patent 10,928,847, 2021 - Google Patents
Methods and apparatuses relating to a hashing accelerator having a frequency scaled
message scheduler data path circuit are described. In one embodiment, a hardware accel …

Compact message permutation for a fully pipelined BLAKE-256/512 accelerator

HL Pham, TH Tran, VTD Le, Y Nakashima - IEEE Access, 2022 - ieeexplore.ieee.org
Develo** a low-cost and high-performance BLAKE accelerator has recently become an
attractive research trend because the BLAKE algorithm is important in widespread …

A hardware perspective on the ChaCha ciphers: Scalable Chacha8/12/20 implementations ranging from 476 slices to bitrates of 175 Gbit/s

J Pfau, M Reuter, T Harbaum… - 2019 32nd IEEE …, 2019 - ieeexplore.ieee.org
AES (Advanced Encryption Standard) accelerators are commonly used in high-throughput
applications, but they have notable resource requirements. We investigate replacing the …

Design of an soc based on 32-bit risc-v processor with low-latency lightweight cryptographic cores in fpga

KM Ma, DH Le, CK Pham, TT Hoang - Future Internet, 2023 - mdpi.com
The security of Internet of Things (IoTs) devices in recent years has created interest in
develo** implementations of lightweight cryptographic algorithms for such systems …

A hybrid CPU/GPU scheme for optimizing ChaCha20 stream cipher

Z Wang, H Chen, W Cai - 2021 IEEE Intl Conf on Parallel & …, 2021 - ieeexplore.ieee.org
The secure transmission of large-scale data has attracted more and more attention. In the
widely recognized security protocol TLSv1. 3, the only algorithms that support large-scale …