Throughput-optimized implementations of QUAD

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Speed Optimized Implementations of the QUAD Algorithm

We present several software and hardware implementations of QUAD, a recently introduced stream cipher designed to be provably secure and practical to implement. The software implementations target both a personal computer and an ARM microprocessor. The hardware implementations target field programmable gate arrays. The purpose of our work was to first find the baseline performance of QUAD imple...

متن کامل

Optimized Software Implementations of E2

This paper describes some techniques for optimizing software implementations of E2 on various platforms. It is relatively easy to implement a byte-oriented cipher such as E2 on an 8-bit processor, but it is difficult to implement it efficiently on a 32-bit processor or a 64-bit processor. In particular, this paper shows some optimization techniques for SPN (Substitution-Permutation Network) on ...

متن کامل

TCP Throughput Optimized Handover Decisions

We consider a mobile user in an environment characterized by a cellular network with whole coverage and isolated Wireless-LAN (WLAN) access points. Downloading a file from the Internet, the user is often confronted with the need to come to a decision whether to handover from the cellular system to a WLAN access point. For offthe-shelf Mobile-IP configurations we show that the overall performanc...

متن کامل

Locality Optimized Shared-Memory Implementations of Iterated Runge-Kutta Methods

Iterated Runge-Kutta (IRK) methods are a class of explicit solution methods for initial value problems of ordinary differential equations (ODEs) which possess a considerable potential for parallelism across the method and the ODE system. In this paper, we consider the sequential and parallel implementation of IRK methods with the main focus on the optimization of the locality behavior. We intro...

متن کامل

On Optimized FPGA Implementations of the SHA-3 Candidate Groestl

Actual and future developments of the automotive market (e.g. the AUTOSAR project or car2car communication systems) will increase the need for a suitable cryptographic infrastructure in modern vehicles. A core component for such a generic cryptographic core is a secure cryptographic hash function, because these functions are the base for a lot of applications like challenge-reponse authenticati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Cryptographic Engineering

سال: 2015

ISSN: 2190-8508,2190-8516

DOI: 10.1007/s13389-015-0109-y