Results 1 - 10
of
181
Designing Integrated Accelerator for Stream Ciphers with Structural Similarities
- In Cryptography and Communications 5(1
, 2013
"... Abstract. Till date, the basic idea for implementing stream ciphers has been confined to individual standalone designs. In this paper, we introduce the notion of integrated implementation of multiple stream ciphers within asinglearchitecture,wherethegoalistoachieveareaandthroughputefficiencybyexploi ..."
Abstract
-
Cited by 3 (2 self)
- Add to MetaCart
,wherethegoalistoachieveareaandthroughputefficiencybyexploitingthestructural similarities of the ciphers at an algorithmic level. We present two case studies to support our idea. First, we propose the merger of SNOW 3G and ZUC stream ciphers, which constitute a part of the 3GPP LTE-Advanced security suite. We propose HiPAcc-LTE, a high performance integrated design that combines
A.: HiPAcc-LTE: an integrated high performance accelerator for 3GPP LTE stream ciphers
- In: INDOCRYPT’11, LNCS
, 2011
"... Abstract. Stream ciphers SNOW 3G and ZUC are the major players in the domain of next generation mobile security as both of them have been included in the security portfolio of 3GPP LTE-Advanced, the po-tential candidate for 4G mobile broadband communication standard. In this paper, we propose HiPAcc ..."
Abstract
-
Cited by 5 (4 self)
- Add to MetaCart
PAcc-LTE, a high performance integrated de-sign that combines the two ciphers in hardware, based on their struc-tural similarities. The integrated architecture reduces the area overhead significantly compared to two distinct cores, and also provides almost double throughput in terms of keystream generation
Analysis of Lightweight Stream Ciphers
- PHD THESIS
, 2008
"... Stream ciphers are fast cryptographic primitives to provide confidentiality of electronically transmitted data. They can be very suitable in environments with restricted resources, such as mobile devices or embedded systems. Practical examples are cell phones, RFID transponders, smart cards or devic ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
proposals, including some eSTREAM candidates. As a result, we elaborate on the design criteria for the development of secure and efficient stream ciphers. The best-known building block is the linear
feedback shift register (LFSR), which can be combined with a nonlinear Boolean output function. A powerful
T.P.: F-FCSR: design of a new class of stream ciphers
- Fast Software Encryption (FSE 2005). Lecture Notes in Computer Science
, 2005
"... In this paper we present a new class of stream ciphers based on a very simple mechanism. The heart of our method is a Feedback with Carry Shift Registers (FCSR) automaton. This automaton is very similar to the classical LFSR generators, except the fact that it performs operations with carries. Its p ..."
Abstract
-
Cited by 21 (7 self)
- Add to MetaCart
In this paper we present a new class of stream ciphers based on a very simple mechanism. The heart of our method is a Feedback with Carry Shift Registers (FCSR) automaton. This automaton is very similar to the classical LFSR generators, except the fact that it performs operations with carries. Its
Chaotic Versus Classical Stream Ciphers - A Comparative Study
- Proc. of Int. Symp. on Circuits and Systems ISCAS’98
, 1998
"... Chaotic and classical (binary) stream ciphers are compared with respect to their cryptographical properties. Possible synchronization schemes, algebraic and analytical properties as well as design and implementation aspects are discussed. For two example classes with similar system structures it is ..."
Abstract
-
Cited by 6 (1 self)
- Add to MetaCart
Chaotic and classical (binary) stream ciphers are compared with respect to their cryptographical properties. Possible synchronization schemes, algebraic and analytical properties as well as design and implementation aspects are discussed. For two example classes with similar system structures
Hardware Design and Analysis of Statistical Cipher Feedback Mode Using Serial Transfer
"... In this paper, the hardware design of a recently proposed mode of operation for a block cipher, referred to as Statistical Cipher Feedback (SCFB), is investigated. Specifically, we examine a structure which employs serial transfer from the Plaintext Queue to the Ciphertext Queue. SCFB mode is the hy ..."
Abstract
- Add to MetaCart
In this paper, the hardware design of a recently proposed mode of operation for a block cipher, referred to as Statistical Cipher Feedback (SCFB), is investigated. Specifically, we examine a structure which employs serial transfer from the Plaintext Queue to the Ciphertext Queue. SCFB mode
Towards a structured design of electronic negotiations
- GROUP DECISION AND NEGOTIATION
, 2003
"... Global communication networks and advances in information technology enable the design of information systems facilitating effective formulation and efficient resolution of negotiation problems. Increasingly, these systems guide negotiators in clarifying the relevant issues, provide media for offer ..."
Abstract
-
Cited by 50 (11 self)
- Add to MetaCart
that underlie on-going studies of electronic negotiations are identified. This provides a basis for integration of different theories and approaches for the specific purpose of the design of effective electronic negotiations. Drawing on diverse streams of literature in different fields such as economics
Materials for an exploratory theory of the network society.
- The British Journal of Sociology
, 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract
-
Cited by 122 (0 self)
- Add to MetaCart
) as in the realm of production. Similarly, technology plays an essential role in framing the relationships of experience: for instance, human reproductive technology frames family relationships and sexuality. Therefore, we must integrate technology, on its own ground, as a speci c layer of the social structure
Summarization and Matching of Density-Based Clusters in Streaming Environments
, 2011
"... Density-based cluster mining is known to serve a broad range of applications ranging from stock trade analysis to moving object monitoring. Although methods for efficient extraction of density-based clusters have been studied in the literature, the problem of summarizing and matching of such cluster ..."
Abstract
-
Cited by 3 (2 self)
- Add to MetaCart
the extracted clusters in real-time, we present an integrated computation strategy C-SGS, which piggybacks the generation of cluster summarizations within the online clustering process. Lastly, we design a mechanism to efficiently execute cluster matching queries, which identify similar clusters for given
Opaque control-flow integrity.
- In 22nd Annual Network and Distributed System Security Symposium, NDSS,
, 2015
"... Abstract-A new binary software randomization and ControlFlow Integrity (CFI) enforcement system is presented, which is the first to efficiently resist code-reuse attacks launched by informed adversaries who possess full knowledge of the inmemory code layout of victim programs. The defense mitigates ..."
Abstract
-
Cited by 10 (1 self)
- Add to MetaCart
the graph of hijackable control-flow edges even from attackers who can view the complete stack, heap, and binary code of the victim process. For maximal efficiency, the integrity checks are implemented using instructions that will soon be hardware-accelerated on commodity x86-x64 processors. The approach
Results 1 - 10
of
181