메뉴 건너뛰기




Volumn , Issue , 2005, Pages 49-56

NPCryptBench: A cryptographic benchmark suite for network processors

Author keywords

Cryptographic algorithm; Network processor; NPCryptbench; Performance evaluation

Indexed keywords

BENCHMARKING; COMPUTER ARCHITECTURE; CRYPTOGRAPHY; HARDWARE SECURITY; MEMORY ARCHITECTURE; MULTITASKING; NETWORK ARCHITECTURE; SYSTEM-ON-CHIP;

EID: 85015520396     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1152779.1147359     Document Type: Conference Paper
Times cited : (10)

References (24)
  • 9
    • 85027404443 scopus 로고    scopus 로고
    • EEMBC, http://www.eembc.org.
    • EEMBC
  • 10
    • 0037420677 scopus 로고    scopus 로고
    • Fundamental architectural considerations for nnetwork processors
    • M. Peyravian and J. Calvignac, "Fundamental Architectural Considerations for Nnetwork Processors", Computer Networks, Vol.41, no.5, 2003.
    • (2003) Computer Networks , vol.41 , Issue.5
    • Peyravian, M.1    Calvignac, J.2
  • 12
    • 8744252011 scopus 로고    scopus 로고
    • Mobile communications world: Security implementations aspects -A state of the art
    • N. Sklavos and O. Koufopavlou, "Mobile Communications World: Security Implementations Aspects -A State of the Art", Computer Science Journal of Moldova, Vol.11, no.2, 2003.
    • (2003) Computer Science Journal of Moldova , vol.11 , Issue.2
    • Sklavos, N.1    Koufopavlou, O.2
  • 20
    • 0003618441 scopus 로고    scopus 로고
    • Report on the development of the advanced encryption standard
    • J. Nechvatal and et al., "Report on the Development of the Advanced Encryption Standard", National Institute of Standard and Technology, http://csrc.nist.gov/CryptoToolkit/aes/round2/r2report.pdf, 2000.
    • (2000) National Institute of Standard and Technology
    • Nechvatal, J.1
  • 21
    • 0001254670 scopus 로고
    • Description of a new variable-length key, 64-Bit block cipher
    • B. Schneier, "Description of a New Variable-Length Key, 64-Bit Block Cipher", Proc. Cambridge Security Workshop, 1994.
    • (1994) Proc. Cambridge Security Workshop
    • Schneier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.