A controllable pipeline framework of block ciphers on GPU for streaming data

C **ao, G Zhao, L Zhang, D Ding - IEEE Access, 2023 - ieeexplore.ieee.org
With the application and development of real-time multimedia information technology such
as online meetings and short videos, the demand for secure transmission of streaming …

Elliptic‐Curve Cryptography Implementation on RISC‐V Processors for Internet of Things Applications

P Preethi, MM Ulla, GPK Yadav, KS Roy… - Journal of …, 2024 - Wiley Online Library
Elliptic‐curve cryptography (ECC) is a popular technique of public‐key cryptography used
for secure communications in Internet of Things (IoT) applications. In this study, the …

AVX-based Acceleration of ARIA Block Cipher Algorithm

TH Yoo, J Kivilinna, CH Cho - IEEE Access, 2023 - ieeexplore.ieee.org
Block cipher algorithms encrypt sensitive personal, financial, and confidential information to
prevent unauthorized access. The ARIA is a general block cipher algorithm with an …

Elliptic‐Curve Cryptography Implementation on RISC‐V Processors for Internet of Things Applications.

PP Srivathsa, MM Ulla, G Yadav… - Journal of …, 2024 - search.ebscohost.com
Elliptic‐curve cryptography (ECC) is a popular technique of public‐key cryptography used
for secure communications in Internet of Things (IoT) applications. In this study, the …

Nonlinear congruential generator over a GF (2^ 8) and its applications in improving AES key expansion algorithm

Y Li - … Conference on Computer Network Security and …, 2023 - spiedigitallibrary.org
The block cipher stands out among the reliable methods for data security. Key expansion is
a crucial step in the block encryption algorithm and is thus important to develop secure …