2018 IEEE Intl Conf on Parallel &Amp; Distributed Processing With Applications, Ubiquitous Computing &Amp; Communications, Big 2018
DOI: 10.1109/bdcloud.2018.00147
|View full text |Cite
|
Sign up to set email alerts
|

HLS-Based Performance and Resource Optimization of Cryptographic Modules

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…For ciphers such as AES, studies on hardware implementations have been presented [1], [6], but for ChaCha ciphers, publications such as [7] mostly describe optimizations for efficient software implementations. To the best of our knowledge, there are three hardware implementations of the ChaCha cipher: A commercial ChaCha20 implementation by Xiphera, Inc. [8].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…For ciphers such as AES, studies on hardware implementations have been presented [1], [6], but for ChaCha ciphers, publications such as [7] mostly describe optimizations for efficient software implementations. To the best of our knowledge, there are three hardware implementations of the ChaCha cipher: A commercial ChaCha20 implementation by Xiphera, Inc. [8].…”
Section: Related Workmentioning
confidence: 99%
“…There's one drawback to this approach though: In the final round, the outputs can be directly obtained at the quarter-round output port. However, as the final round is a diagonal round, the matrix elements will be emitted in the order (0, 5, 10, 15), (1,6,11,12), etc.…”
Section: B Block Memory and Register Implementationsmentioning
confidence: 99%
“…Therefore, it is desirable to implement image processing with high computational load in hardware (1)(2)(3) . To reduce the development burden of image processing hardware, FPGA and High-Level Synthesis (HLS) (4)(5)(6) are effective because FPGA can rewrite any digital circuits many times, and HLS can automatically turn software description into hardware description.…”
Section: Introductionmentioning
confidence: 99%
“…The second validation set is composed of 11 floating-point kernels, and 5 kernels with integer and bitwise operations. The floating-point kernels are from the PolyBench benchmark, and the non-floating-point kernels are from an AES security module for FP-GAs that provides data and design confidentiality (SILITONGA et al, 2018). The AES module is part of a support system that does not compose the main application to be mapped on the FPGA.…”
Section: Second Validation: Resource and Timing-aware Explorationmentioning
confidence: 99%