High Performance Agile Crypto Modules

作者: Chandana G. Gamage , Jussipekka Leiwo , Yuliang Zheng

DOI: 10.1007/10718964_7

关键词:

摘要: This paper examines the impact of primary symmetric key cryptographic operation on network data streams, encryption user data, have overall traffic throughput. The function which provides basic confidentiality security service is studied from two design perspectives based ability a cipher unit to dynamically re-parameterize itself while processing high speed stream. designs in this were chosen their suitability for and flexibility satisfying dynamic requirements. We develop analytical techniques model performance each scheme.

参考文章(19)
Bruce Schneier, John Kelsey, David Wagner, Doug Whiting, Chris Hall, Niels Ferguson, Performance Comparison of the AES Submissions ,(1999)
Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson, On the Twofish Key Schedule selected areas in cryptography. pp. 27- 42 ,(1998) , 10.1007/3-540-48892-8_3
Aggelos Kiayias, Moti Yung, Polynomial reconstruction based cryptography selected areas in cryptography. pp. 129- 133 ,(2001) , 10.1007/3-540-45537-X_10
Jean Walrand, Pravin Varaiya, High-Performance Communication Networks ,(1999)
Yuliang Zheng, The SPEED Cipher financial cryptography. pp. 71- 90 ,(1997) , 10.1007/3-540-63594-7_68
Raif O. Onvural, Asynchronous Transfer Mode Networks: Performance Issues Artech House, Inc.. ,(1993)
Fabrice Noilhan, Serge Vaudenay, Thomas Pornin, Guillaume Poupard, Helena Handschuh, Olivier Baudron, David Pointcheval, Jacques Stern, Henri Gilbert, Louis Granboulan, Phong Q. Nguyen, Antoine Joux, Report on the AES Candidates Proceedings from the Second Advanced Encryption Standard Candidate Conference, National Institute of Standards and Technology (NIST). ,(1999)
Joan Daemen, Vincent Rijmen, The Block Cipher Rijndael Lecture Notes in Computer Science. pp. 277- 284 ,(2000) , 10.1007/10721064_26
Shaw-Cheng Chuang, Securing ATM networks Proceedings of the 3rd ACM conference on Computer and communications security - CCS '96. pp. 19- 30 ,(1996) , 10.1145/238168.238181