-
1
-
-
38049068678
-
Multi-gigabit gcm-aes architecture optimized for fpgas
-
Berlin, Heidelberg: Springer-Verlag
-
S. Lemsitzer, J. Wolkerstorfer, N. Felber, and M. Braendli, "Multi-gigabit gcm-aes architecture optimized for fpgas," in CHES '07: Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems. Berlin, Heidelberg: Springer-Verlag, 2007, pp. 227-238.
-
(2007)
CHES '07: Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems
, pp. 227-238
-
-
Lemsitzer, S.1
Wolkerstorfer, J.2
Felber, N.3
Braendli, M.4
-
2
-
-
33645232695
-
Area-throughput trade-offs for fully pipelined 30 to 70 gbits/s aes processors
-
A. Hodjat and I. Verbauwhede, "Area-throughput trade-offs for fully pipelined 30 to 70 gbits/s aes processors," IEEE Transactions on Computers, vol. 55, pp. 366-372, 2006.
-
(2006)
IEEE Transactions on Computers
, vol.55
, pp. 366-372
-
-
Hodjat, A.1
Verbauwhede, I.2
-
3
-
-
35248880566
-
Very compact fpga implementation of aes algorithm
-
Berlin Heidelberg: Springer-Verlag
-
P. Chodowiec and K. Gaj, "Very compact fpga implementation of aes algorithm," in CHES 2003. Berlin Heidelberg: Springer-Verlag, 2003, pp. 319-333.
-
(2003)
CHES 2003
, pp. 319-333
-
-
Chodowiec, P.1
Gaj, K.2
-
4
-
-
33645407730
-
-
[Online]
-
Special Publication 800-38A, NIST Std., 2001. [Online]. Available: http://csrc.nist.gov/
-
(2001)
Special Publication 800-38A
-
-
-
5
-
-
38149050593
-
High-speed pipelined hardware architecture for galois counter mode
-
S. B. Heidelberg, Ed.
-
A. Satoh, Takeshi, and T. Aoki, "High-speed pipelined hardware architecture for galois counter mode," in Information Security, ser. Lecture Notes in Computer Science, S. B. Heidelberg, Ed., vol. 4779/2007, 2007, pp. 118-129.
-
(2007)
Information Security, Ser. Lecture Notes in Computer Science
, vol.4779
, Issue.2007
, pp. 118-129
-
-
Satoh, A.1
Takeshi2
Aoki, T.3
-
7
-
-
79953178355
-
-
[Online]
-
Special Publication 800-38C, NIST Std., 2004. [Online]. Available: http://csrc.nist.gov/
-
(2004)
Special Publication 800-38C
-
-
-
8
-
-
50649105796
-
An fpga-based aes-ccm crypto core for ieee 802.11i architecture
-
A. Aziz and N. Ikram, "An fpga-based aes-ccm crypto core for ieee 802.11i architecture," I. J. Network Security, vol. 5, no. 2, pp. 224-232, 2007.
-
(2007)
I. J. Network Security
, vol.5
, Issue.2
, pp. 224-232
-
-
Aziz, A.1
Ikram, N.2
-
9
-
-
83455257056
-
Fpga implementation aes for ccm mode encryption using xilinx spartan-ii
-
K. Vu and D. Zier, "Fpga implementation aes for ccm mode encryption using xilinx spartan-ii," Oregon State University, Tech. Rep., 2007.
-
(2007)
Oregon State University, Tech. Rep.
-
-
Vu, K.1
Zier, D.2
-
10
-
-
33745848051
-
An fpga implementation of ccm mode using aes
-
E. López-Trejo, F. Rodríguez-Henríquez, and A. Díaz-Pérez, "An fpga implementation of ccm mode using aes," in ICISC, 2005, pp. 322-334.
-
(2005)
ICISC
, pp. 322-334
-
-
López-Trejo, E.1
Rodríguez-Henríquez, F.2
Díaz-Pérez, A.3
-
11
-
-
62349091083
-
Celator: A multi-algorithm cryptographic co-processor
-
Dec. 3-5
-
D. Fronte, A. Perez, and E. Payrat, "Celator: A multi-algorithm cryptographic co-processor," in Proc. International Conference on Reconfigurable Computing and FPGAs ReConFig '08, Dec. 3-5, 2008, pp. 438-443.
-
(2008)
Proc. International Conference on Reconfigurable Computing and FPGAs ReConFig '08
, pp. 438-443
-
-
Fronte, D.1
Perez, A.2
Payrat, E.3
-
12
-
-
35048901471
-
Cryptonite - A programmable crypto processor architecture for high-bandwidth applications
-
S. B. Heidelberg, Ed
-
R. Buchty, N. Heintze, and D. Oliva, "Cryptonite - a programmable crypto processor architecture for high-bandwidth applications," in Organic and Pervasive Computing - ARCS 2004, ser. Lecture Notes in Computer Science, S. B. Heidelberg, Ed., vol. 2981/2004, 2004, pp. 184-198.
-
(2004)
Organic and Pervasive Computing - ARCS 2004, Ser. Lecture Notes in Computer Science
, vol.2981
, Issue.2004
, pp. 184-198
-
-
Buchty, R.1
Heintze, N.2
Oliva, D.3
-
13
-
-
0034851535
-
Cryptomaniac: A fast flexible architecture for secure communication
-
New York, NY, USA: ACM
-
L. Wu, C. Weaver, and T. Austin, "Cryptomaniac: a fast flexible architecture for secure communication," in ISCA '01: Proceedings of the 28th annual international symposium on Computer architecture. New York, NY, USA: ACM, 2001, pp. 110-119.
-
(2001)
ISCA '01: Proceedings of the 28th Annual International Symposium on Computer Architecture
, pp. 110-119
-
-
Wu, L.1
Weaver, C.2
Austin, T.3
-
14
-
-
77951430191
-
A reconfigurable crypto sub system for the software communication architecture
-
M. Grand, L. Bossuet, G. Gogniat, B. L. Gal, and D. Dallet, "A reconfigurable crypto sub system for the software communication architecture," in Proceedings MILCOM2009, 2009.
-
(2009)
Proceedings MILCOM2009
-
-
Grand, M.1
Bossuet, L.2
Gogniat, G.3
Gal, B.L.4
Dallet, D.5
-
17
-
-
78649268516
-
-
[Online]
-
FIPS-197, NIST Std., 2001. [Online]. Available: http://csrc.nist.gov/
-
(2001)
FIPS-197
-
-
|