Proceedings. IEEE Symposium on FPGAs for Custom Computing Machines (Cat. No.98TB100251)
DOI: 10.1109/fpga.1998.707930
|View full text |Cite
|
Sign up to set email alerts
|

DES key breaking, encryption and decryption on the XC6216

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…The use of FPGAs as a means of building hardware to crack cryptosystems has been suggested by many in the past and we only cite a few here [11,12]. FPGAs are an obvious technology because of the relatively low cost.…”
Section: Other Attemptsmentioning
confidence: 99%
“…The use of FPGAs as a means of building hardware to crack cryptosystems has been suggested by many in the past and we only cite a few here [11,12]. FPGAs are an obvious technology because of the relatively low cost.…”
Section: Other Attemptsmentioning
confidence: 99%
“…Such tasks occur in several key application areas for FPGAs, e.g., video communication and video processing [4,16], cryptographic applications [6,17], and neural computing [3]. While the execution of tasks is suspended during a rearrangement their input data streams have to be buffered.…”
Section: Introductionmentioning
confidence: 99%