An Efficient Parallelized Algorithm of SEED Block Cipher on Cell BE
نویسندگان
چکیده
منابع مشابه
An Efficient Quasigroup Block Cipher
Low powered devices, such as smart phones, tablets and sensors, present a particular challenge for advanced encryption systems. In this paper, we present a new quasigroup block encryption system that has low memory and computational requirements and hence suitable for low powered devices.We compare its performance against Advanced Encryption Standard-256 (AES-256) bit algorithm using theNIST st...
متن کاملThe MAGENTA Block Cipher Algorithm
4 Algebraic Properties 5 4.1 The Function f(x) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 4.2 The Function PE(x; y) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 4.3 Two Successive Combinations of . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 4.4 The Function T . . . . . . . . . . . . . . . . . ...
متن کاملEfficient FPGA Implementation of Block Cipher MISTY1
NESSIE is a 3-year research project (2000-2002). The goal of the project is to put forward some algorithms to obtain a set of the next generation of cryptographic primitives. In order to achieve this objective, the project needs to evaluate mathematical security levels and software/hardware implementations. This paper investigates the significance of an FPGA implementation of the block cipher M...
متن کاملParallelized Block Match Algorithm on Multi-core Processors
In order to increase the coding efficiency of H.264/AVC, this paper proposed a parallelized approach of full search (FS) algorithm for motion estimation on Graphic Processor Unit (GPU) using computing unified device architecture (CUDA). By utilizing the independence among different MBs, we are able to take the full advantage of the computational power of CUDA and speed up the FS motion estimati...
متن کاملOn Efficient Message Authentication Via Block Cipher Design Techniques
In an effort to design a MAC scheme that is built using block cipher components and runs faster than the modes of operation for message authentication, Daemen and Rijmen have proposed a generic MAC construction ALRED and a concrete ALRED instance Pelican. The Pelican MAC uses four rounds of AES as a building block to compute the authentication tag in a CBC-like manner. It is about 2.5 times fas...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The KIPS Transactions:PartA
سال: 2010
ISSN: 1598-2831
DOI: 10.3745/kipsta.2010.17a.6.275