Throughput-optimized implementations of QUAD
نویسندگان
چکیده
منابع مشابه
Speed Optimized Implementations of the QUAD Algorithm
We present several software and hardware implementations of QUAD, a recently introduced stream cipher designed to be provably secure and practical to implement. The software implementations target both a personal computer and an ARM microprocessor. The hardware implementations target field programmable gate arrays. The purpose of our work was to first find the baseline performance of QUAD imple...
متن کاملOptimized Software Implementations of E2
This paper describes some techniques for optimizing software implementations of E2 on various platforms. It is relatively easy to implement a byte-oriented cipher such as E2 on an 8-bit processor, but it is difficult to implement it efficiently on a 32-bit processor or a 64-bit processor. In particular, this paper shows some optimization techniques for SPN (Substitution-Permutation Network) on ...
متن کاملTCP Throughput Optimized Handover Decisions
We consider a mobile user in an environment characterized by a cellular network with whole coverage and isolated Wireless-LAN (WLAN) access points. Downloading a file from the Internet, the user is often confronted with the need to come to a decision whether to handover from the cellular system to a WLAN access point. For offthe-shelf Mobile-IP configurations we show that the overall performanc...
متن کاملLocality Optimized Shared-Memory Implementations of Iterated Runge-Kutta Methods
Iterated Runge-Kutta (IRK) methods are a class of explicit solution methods for initial value problems of ordinary differential equations (ODEs) which possess a considerable potential for parallelism across the method and the ODE system. In this paper, we consider the sequential and parallel implementation of IRK methods with the main focus on the optimization of the locality behavior. We intro...
متن کاملOn Optimized FPGA Implementations of the SHA-3 Candidate Groestl
Actual and future developments of the automotive market (e.g. the AUTOSAR project or car2car communication systems) will increase the need for a suitable cryptographic infrastructure in modern vehicles. A core component for such a generic cryptographic core is a secure cryptographic hash function, because these functions are the base for a lot of applications like challenge-reponse authenticati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Cryptographic Engineering
سال: 2015
ISSN: 2190-8508,2190-8516
DOI: 10.1007/s13389-015-0109-y