메뉴 건너뛰기




Volumn 34, Issue 6, 2008, Pages 531-546

On the design and implementation of a RISC processor extension for the KASUMI encryption algorithm

Author keywords

Block cipher; Cryptography; Hardware implementation; KASUMI; RISC Processors

Indexed keywords

ALGORITHMS; CELLULAR NEURAL NETWORKS; CELLULAR TELEPHONE SYSTEMS; CRYPTOGRAPHY; MOBILE TELECOMMUNICATION SYSTEMS; RADIO BROADCASTING; RADIO TRANSMISSION; REDUCED INSTRUCTION SET COMPUTING; RELIABILITY; TELEPHONE SYSTEMS;

EID: 50849101397     PISSN: 00457906     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.compeleceng.2007.11.003     Document Type: Article
Times cited : (11)

References (15)
  • 1
    • 50849104714 scopus 로고    scopus 로고
    • 3rd generation partnership program. Security architecture. Technical specification 33.102, Release 5, Version 5.2.0; 2003.
    • 3rd generation partnership program. Security architecture. Technical specification 33.102, Release 5, Version 5.2.0; 2003.
  • 2
    • 50849113020 scopus 로고    scopus 로고
    • 3rd generation partnership program. Specification of the 3GPP confidentiality and integrity algorithms, Document 1: f8 and f9 Specification. Technical specification 35.201, Release 5, Version 5.0.0; 2002.
    • 3rd generation partnership program. Specification of the 3GPP confidentiality and integrity algorithms, Document 1: f8 and f9 Specification. Technical specification 35.201, Release 5, Version 5.0.0; 2002.
  • 3
    • 50849130508 scopus 로고    scopus 로고
    • 3rd generation partnership program. Specification of the 3GPP confidentiality and integrity algorithms. Document 2: KASUMI specification. Technical specification 35.202, Release 5, Version 5.0.0; 2002.
    • 3rd generation partnership program. Specification of the 3GPP confidentiality and integrity algorithms. Document 2: KASUMI specification. Technical specification 35.202, Release 5, Version 5.0.0; 2002.
  • 5
    • 50849117748 scopus 로고    scopus 로고
    • Preneel B, Bosselaers A, Biryukov A, Stern J, Granboulan L, Nguyen P, et al., Open problems in cryptology. STORK project report RUB-D6-2.1, June 2003. .
    • Preneel B, Bosselaers A, Biryukov A, Stern J, Granboulan L, Nguyen P, et al., Open problems in cryptology. STORK project report RUB-D6-2.1, June 2003. .
  • 6
    • 50849083104 scopus 로고    scopus 로고
    • Dworkin M. Recommendation for block cipher modes of operation. NIST special publication 800-38A; 2001.
    • Dworkin M. Recommendation for block cipher modes of operation. NIST special publication 800-38A; 2001.
  • 7
    • 24644468993 scopus 로고    scopus 로고
    • Balderas T, Cumplido R. An efficient reuse-based approach to implement the 3GPP KASUMI block cipher. in: Proceedings of the first international conference on electrical and electronics engineering and 10th conference on electrical engineering ICEEE/CIE, Acapulco, Mexico; 2004, p. 113-18.
    • Balderas T, Cumplido R. An efficient reuse-based approach to implement the 3GPP KASUMI block cipher. in: Proceedings of the first international conference on electrical and electronics engineering and 10th conference on electrical engineering ICEEE/CIE, Acapulco, Mexico; 2004, p. 113-18.
  • 8
    • 50849113690 scopus 로고    scopus 로고
    • Balderas T, Cumplido R. "An efficient hardware implementation of the KASUMI block cipher for third generation cellular networks. In: Proceedings of the global signal processing conference, GSPx 2004, Santa Clara, CA; 2004.
    • Balderas T, Cumplido R. "An efficient hardware implementation of the KASUMI block cipher for third generation cellular networks. In: Proceedings of the global signal processing conference, GSPx 2004, Santa Clara, CA; 2004.
  • 9
    • 50849094488 scopus 로고    scopus 로고
    • Kim H, Choi Y, Kim M, Ryu H. "Hardware implementation of the 3GPP KASUMI crypto algorithm. In: Proceedings of the 2002 international technical conference on circuits/systems, computers and communications, ITC-CSCC-2002. Phuket, Thailand. p. 317-20.
    • Kim H, Choi Y, Kim M, Ryu H. "Hardware implementation of the 3GPP KASUMI crypto algorithm. In: Proceedings of the 2002 international technical conference on circuits/systems, computers and communications, ITC-CSCC-2002. Phuket, Thailand. p. 317-20.
  • 10
    • 4344706358 scopus 로고    scopus 로고
    • Kitsos P, Galanis MD, Koufopavlou O. High-speed hardware implementations of the KASUMI block cipher. In: Proceedings of the 2004 IEEE international symposium on circuit and systems ISCAS'04, Vancouver, Canada; 2004.
    • Kitsos P, Galanis MD, Koufopavlou O. High-speed hardware implementations of the KASUMI block cipher. In: Proceedings of the 2004 IEEE international symposium on circuit and systems ISCAS'04, Vancouver, Canada; 2004.
  • 11
    • 84947243136 scopus 로고    scopus 로고
    • On the hardware implementation of the 3GPP confidentiality and integrity algorithms
    • Proceedings of the fourth International conference on information security ISC 2001, Malaga, Spain, Springer-Verlag
    • Marinis K., Moshopoulos N.K., Karoubalis F., and Pekmestzi K.Z. On the hardware implementation of the 3GPP confidentiality and integrity algorithms. Proceedings of the fourth International conference on information security ISC 2001, Malaga, Spain. LNCS 2200/2001 (2001), Springer-Verlag 248-265
    • (2001) LNCS 2200/2001 , pp. 248-265
    • Marinis, K.1    Moshopoulos, N.K.2    Karoubalis, F.3    Pekmestzi, K.Z.4
  • 12
    • 84945295725 scopus 로고    scopus 로고
    • Small and high Speed hardware architectures for the 3GPP standard cipher KASUMI
    • Proceedings of the fifth international conference on information security ISC 2002, Sao Paulo, Brazil, Springer-Verlag
    • Satoh A., Morioka N.K., and Karoubalis S. Small and high Speed hardware architectures for the 3GPP standard cipher KASUMI. Proceedings of the fifth international conference on information security ISC 2002, Sao Paulo, Brazil. LNCS 2433/2002 (2002), Springer-Verlag 48-62
    • (2002) LNCS 2433/2002 , pp. 48-62
    • Satoh, A.1    Morioka, N.K.2    Karoubalis, S.3
  • 13
    • 1942455360 scopus 로고    scopus 로고
    • Design and implementation of a private and public key crypto processor and its application to a security system
    • Kim H.W., and Lee S. Design and implementation of a private and public key crypto processor and its application to a security system. IEEE Transactions on Consumer Electronics 50 1 (2004) 214-224
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.1 , pp. 214-224
    • Kim, H.W.1    Lee, S.2
  • 14
    • 50849097172 scopus 로고    scopus 로고
    • Wallander A. A VHDL implementation of a MIPS. Project report, Department of Computer Science and Electrical Engineering, Lulea Tekniska Universitet, Lulea, Sweden.
    • Wallander A. A VHDL implementation of a MIPS. Project report, Department of Computer Science and Electrical Engineering, Lulea Tekniska Universitet, Lulea, Sweden.
  • 15
    • 50849122612 scopus 로고    scopus 로고
    • MIPS technologies. MIPS SDE 5.03 Programmer's guide. Document Number MD00310, Revision 1.67; 2004.
    • MIPS technologies. MIPS SDE 5.03 Programmer's guide. Document Number MD00310, Revision 1.67; 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.