Filters








34,857 Hits in 5.2 sec

Testing of large number multiplication functions in cryptographic systems

T.H. Tse, T.Y. Chen, Zhiquan Zhou
Proceedings First Asia-Pacific Conference on Quality Software  
Although much research has already been done on the testing of multiplication functions, most does not meet the need of cryptographic systems, where very large numbers are involved.  ...  Integer multiplication is one of the fundamental functions in cryptographic systems.  ...  This is obviously too short for cryptographic systems. In this paper, we shall present a method of testing large number multiplication functions in cryptographic systems.  ... 
doi:10.1109/apaq.2000.883782 dblp:conf/apaqs/TseZC00 fatcat:qnvdqgu2hfagnbk3sw7dvifg54

Special session

Cathy Gebotys, Hiroto Yasuura, Michael Torla, Srivaths Ravi, Naofumi Takagi
2002 Proceedings of the 15th international symposium on System Synthesis - ISSS '02  
In design process of SoC, choice of IP's and design data control also significantly affect on the security of the systems that uses the SoC.  ...  System architecture, circuit complexity, test and validation, energy consumption, security policy, and design methodology are discussed for exploring research directions of secure system synthesis.  ...  Each cryptographic accelerator core requires a suite of functional tests to ensure proper functionality, including compliance to standards.  ... 
doi:10.1145/581199.581242 fatcat:2xcbhghk6bgxfafkwat22gxpmi

Functional safety and survivability of information control elliptic-curve-based systems: models and methods

Marek A. ALEKSANDER, Mikolaj P. KARPINSKI, Grzegorz K. LITAWA
2013 Ukrainian Scientific Journal of Information Security  
Research interests: cybersecurity, computer systems and wireless networks, especially their security, in particular cryptographic methods of information defense, lighting engineering and electric and photometric  ...  Current position & Functions: Chairman of Computer Science Division since 2009.  ...  In cryptographic devices based on curves there are large amount of modular multiplications while traditional approach to multiplication in computers does not provide satisfying results.  ... 
doi:10.18372/2225-5036.19.4704 fatcat:uxvy2obpljg5np4a4l7ygxgava

Operating System Integration and Performance of a Multi Stream Cipher Architecture for Reconfigurable System-on-Chip

C.M. Wee, P.R. Sutton, N.W. Bergmann
2007 15th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2007)  
This paper describes the integration and performance of a multi-stream cipher core with a uClinux Microblaze based reconfigurable System-on-Chip that uses the Open Crypto Framework.  ...  when there are a large number of operations and multiple streams.  ...  One such option for cryptographic functionality is the OpenBSD Cryptographic Framework (OCF) [5] .  ... 
doi:10.1109/fccm.2007.19 dblp:conf/fccm/WeeSB07 fatcat:fw46mhcq2bg7raggy3txdb5qb4

Dynamically Reconfigurable Encryption and Decryption System Design for the Internet of Things Information Security

Zhu Wang, Yan Yao, Xiaojun Tong, Qinghua Luo, Xiangyu Chen
2019 Sensors  
To solve the problem of high consumption and low flexibility of multiple cryptographic algorithms hardware implementation, we have designed the Dynamically Reconfigurable Encryption and Decryption System  ...  Considering the functional requirements, the cryptographic algorithm reconfigurable module files stored in External Memory could be configured dynamically into the assigned on-chip Reconfigurable Partition  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s19010143 fatcat:iahuufmriffuxifavazl726dci

Transparent multi-core cryptographic support on Niagara CMT Processors

James Hughes, Gary Morton, Jan Pechanec, Christoph Schuba, Lawrence Spracklen, Bhargava Yenduri
2009 2009 ICSE Workshop on Multicore Software Engineering  
This paper examines aspects of making the next step in this evolution work, namely the use of dedicated cryptographic hardware that's part of multi-core system CPUs.  ...  While the inclusion of cryptographic accelerator functionality in the processor chip is not new, this paper investigates the question of how to transparently combine such multi-core cryptographic processor  ...  Thanks also to the authors of the documentation for the Solaris Cryptographic Framework who generously gave us text for introducing the architecture of the (Open)Solaris Cryptographic Framework in section  ... 
doi:10.1109/iwmse.2009.5071387 fatcat:yxrotctdkfesnkzi7hgqqyzpli

Challenges in designing trustworthy cryptographic co-processors

Ricardo Graves, Giorgio Di Natale, Lejla Batina, Shivam Bhasin, Baris Ege, Apostolos Fournaris, Nele Mentens, Stjepan Picek, Francesco Regazzoni, Vladimir Rozic, Nicolas Sklavos, Bohan Yang
2015 2015 IEEE International Symposium on Circuits and Systems (ISCAS)  
The documents may come from teaching and research institutions in France or abroad, or from public or private research centers.  ...  HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not.  ...  Such techniques can become impractical when applied on a large number of ICs.  ... 
doi:10.1109/iscas.2015.7169070 dblp:conf/iscas/GravesNBBEFMPRR15 fatcat:lx6ksv3akbet5f25ghsqdl4r2q

GPU Accelerated Cryptography as an OS Service [chapter]

Owen Harrison, John Waldron
2010 Lecture Notes in Computer Science  
In recent years there has been a surge in research involving the use of GPUs as cryptographic accelerators.  ...  This paper demonstrates that it is feasible to use a centralised kernel service to provide a standardised abstraction to GPU accelerated cryptographic functions for both kernelspace and userspace components  ...  The GPU benefits from large amounts of work, thus if multiple threads are issuing requests, system wide throughput can benefit from the batching of multiple requests before they are delivered to the GPU  ... 
doi:10.1007/978-3-642-17697-5_6 fatcat:qukyzwnhsffyzhaa722txgmft4

Hardware Implementation of Chaotic Zigzag Map Based Bitwise Dynamical Pseudo Random Number Generator on Field-Programmable Gate Array

2021 Informacije midem  
In order to improve the statistical sufficiency of these numbers, the H function post-processing technique is used.  ...  In the study, the non-linear dynamic behaviour of the chaotic generator synthesized on the Altera Cyclone IV GX FPGA chip is examined in terms of critical cryptographic competences such as system reliability  ...  Conflict of interest The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.  ... 
doi:10.33180/infmidem2020.402 fatcat:ntiihuqdiraftnngscfyimbqta

A Guideline on Pseudorandom Number Generation (PRNG) in the IoT [article]

Peter Kietzmann, Thomas C. Schmidt, Matthias Wählisch
2020 arXiv   pre-print
Random numbers are an essential input to many functions on the Internet of Things (IoT).  ...  In this paper, we revisit the generation of randomness from the perspective of an IoT operating system (OS) that needs to support general purpose or crypto-secure random numbers.  ...  AUTHOR BIOGRAPHY Peter Kietzmann received the M.Eng. degree in information technology from the Hamburg University of Applied Sciences, Hamburg, Germany, where he is currently pursuing the Ph.D. degree  ... 
arXiv:2007.11839v2 fatcat:dkiqyrddgfbfngxo2ysca3rb6a

Comparative Implementation Analysis of AES Algorithm

Boris Damjanović, Dejan Simić
2011 JITA - Journal of Information Technology and Applications (Banja Luka) - APEIRON  
This paper represents a study which compares performance of well known cryptographic packages - Oracle/Sun and Bouncy Castle implementations in relation to our own small and specialized implementations  ...  Advanced Encryption Standard (AES) is the first cryptographic standard aroused as a result of public competition that was established by U.S. National Institute of Standards and Technology.  ...  ACKNOWLEDGMENTS The work presented here was partially supported by the Serbian Ministry of Science and Technological development (project Multimodal biometry in identity management, contract no TR-32013  ... 
doi:10.7251/jit1102119d fatcat:efgzl273knb2zgnkzvlift5vb4

An Efficient Stream Data Processing Model for Multiuser Cryptographic Service

Li Li, Fenghua Li, Guozhen Shi, Kui Geng
2018 Journal of Electrical and Computer Engineering  
(DPP) according to the characteristics of cryptographic operations and realized cryptographic operations of cross-data streams with different service requirements in a multiuser environment.  ...  Increasing the pipeline depth and improving the processing performance in each stage of the pipeline are the key to improving the system performance.  ...  Acknowledgments is work was supported by the National Key R&D Program of China (no. 2017YFB0802705) and the National Natural Science Foundation of China (no. 61672515). References  ... 
doi:10.1155/2018/3917827 fatcat:7sfbna6vbjghtlicgqxahhzyvi

An Easy-to-Integrate IP Design of AHB Slave Bus Interface for the Security Chip of IoT

Conggui Yuan, Xin Zheng, Bo Rao, Shuting Cai, Chuan Li
2021 Mathematical Problems in Engineering  
This paper proposes an Advanced High-performance Bus Slave Control IP (AHB-SIP), which applies to cryptographic accelerators in IoT security chips.  ...  AHB-SIP is applied to the security accelerators of SM2, SM3, and SM4 and random number generator (RNG).  ...  Our designed RNG module in the SoC is tested based on the standard NIST SP800-22. e random numbers to be tested for each set are divided into 1000 groups, with each group containing 1M bit random numbers  ... 
doi:10.1155/2021/5154769 fatcat:pf6tzjw2zbh2rghlcugjmtpcae

The SAT solving method as applied to cryptographic analysis of asymmetric ciphers [article]

R.T. Faizullin, I.G. Khnykin, V.I.Dylkeyt
2009 arXiv   pre-print
Also gives the schema of using the method to important problems of cryptographic analysis of asymmetric ciphers, including determining concrete bits of multipliers (in binary form) in large factorization  ...  This article proves the special construction of the functional and offers to solve the system of non-linear algebraic equation that determines functional stationary points via modified method of consecutive  ...  To determine which bits are right with high probability we offer a system of tests. One of these tests consists in follow. Let us consider the matrix of long multiplication of binary numbers p and q.  ... 
arXiv:0907.1755v1 fatcat:ohvtylixkja4tnehqiohac4m44

A Study on Scalar Multiplication Parallel Processing for X25519 Decryption of 5G Core Network SIDF Function for mMTC IoT Environment

Changuk Jang, Juhong Han, Akshita Maradapu Vera Venkata Sai, Yingshu Li, Okyeon Yi, Qiang Ye
2022 Wireless Communications and Mobile Computing  
This proposal was aimed at reducing the load in the mMTC environment by performing parallel processing of all cryptographic operations performed in the SIDF using a GPU.  ...  Therefore, in this paper, we propose a method of constructing 5G SIDF in an mMTC IoT environment. A key method of the proposed 5G SIDF configuration is the use of GPUs.  ...  To provide wireless connectivity to such a large number of devices by the time IoT comes to fruition, 3GPP has identified mMTC as one of the three main use cases of the 5G wireless systems [1] .  ... 
doi:10.1155/2022/4087816 fatcat:uzx4zftz25gkjnbh742kpovtwy
« Previous Showing results 1 — 15 out of 34,857 results