A controllable pipeline framework of block ciphers on GPU for streaming data
C **ao, G Zhao, L Zhang, D Ding - IEEE Access, 2023 - ieeexplore.ieee.org
With the application and development of real-time multimedia information technology such
as online meetings and short videos, the demand for secure transmission of streaming …
as online meetings and short videos, the demand for secure transmission of streaming …
Elliptic‐Curve Cryptography Implementation on RISC‐V Processors for Internet of Things Applications
Elliptic‐curve cryptography (ECC) is a popular technique of public‐key cryptography used
for secure communications in Internet of Things (IoT) applications. In this study, the …
for secure communications in Internet of Things (IoT) applications. In this study, the …
AVX-based Acceleration of ARIA Block Cipher Algorithm
TH Yoo, J Kivilinna, CH Cho - IEEE Access, 2023 - ieeexplore.ieee.org
Block cipher algorithms encrypt sensitive personal, financial, and confidential information to
prevent unauthorized access. The ARIA is a general block cipher algorithm with an …
prevent unauthorized access. The ARIA is a general block cipher algorithm with an …
Elliptic‐Curve Cryptography Implementation on RISC‐V Processors for Internet of Things Applications.
Elliptic‐curve cryptography (ECC) is a popular technique of public‐key cryptography used
for secure communications in Internet of Things (IoT) applications. In this study, the …
for secure communications in Internet of Things (IoT) applications. In this study, the …
Nonlinear congruential generator over a GF (2^ 8) and its applications in improving AES key expansion algorithm
Y Li - … Conference on Computer Network Security and …, 2023 - spiedigitallibrary.org
The block cipher stands out among the reliable methods for data security. Key expansion is
a crucial step in the block encryption algorithm and is thus important to develop secure …
a crucial step in the block encryption algorithm and is thus important to develop secure …