A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments
JH Kong, LM Ang, KP Seng - Journal of Network and Computer …, 2015 - Elsevier
Modern cryptographic algorithms play an irreplaceable role in data communication systems
for various areas of applications. These algorithms are the backbone of data protection and …
for various areas of applications. These algorithms are the backbone of data protection and …
Apparatuses, methods, and systems for blockchain transaction acceleration
SN Peffers, SM Gulley - US Patent 10,761,877, 2020 - Google Patents
Methods and apparatuses relating to accelerating blockchain transactions are described. In
one embodiment, a processor includes a hardware accelerator to execute an operation of a …
one embodiment, a processor includes a hardware accelerator to execute an operation of a …
Resource-shared crypto-coprocessor of AES Enc/Dec with SHA-3
Cryptographic co-processors are integral to the modern System-on-Chips. Flexibility in such
designs serves dual purpose, ie, it enables acceleration of different essential cryptographic …
designs serves dual purpose, ie, it enables acceleration of different essential cryptographic …
Apparatuses and methods for frequency scaling a message scheduler data path of a hashing accelerator
Methods and apparatuses relating to a hashing accelerator having a frequency scaled
message scheduler data path circuit are described. In one embodiment, a hardware accel …
message scheduler data path circuit are described. In one embodiment, a hardware accel …
Compact message permutation for a fully pipelined BLAKE-256/512 accelerator
Develo** a low-cost and high-performance BLAKE accelerator has recently become an
attractive research trend because the BLAKE algorithm is important in widespread …
attractive research trend because the BLAKE algorithm is important in widespread …
A hardware perspective on the ChaCha ciphers: Scalable Chacha8/12/20 implementations ranging from 476 slices to bitrates of 175 Gbit/s
J Pfau, M Reuter, T Harbaum… - 2019 32nd IEEE …, 2019 - ieeexplore.ieee.org
AES (Advanced Encryption Standard) accelerators are commonly used in high-throughput
applications, but they have notable resource requirements. We investigate replacing the …
applications, but they have notable resource requirements. We investigate replacing the …
Design of an soc based on 32-bit risc-v processor with low-latency lightweight cryptographic cores in fpga
The security of Internet of Things (IoTs) devices in recent years has created interest in
develo** implementations of lightweight cryptographic algorithms for such systems …
develo** implementations of lightweight cryptographic algorithms for such systems …
A hybrid CPU/GPU scheme for optimizing ChaCha20 stream cipher
The secure transmission of large-scale data has attracted more and more attention. In the
widely recognized security protocol TLSv1. 3, the only algorithms that support large-scale …
widely recognized security protocol TLSv1. 3, the only algorithms that support large-scale …