2010
DOI: 10.1504/ijhpsa.2010.034541
|View full text |Cite
|
Sign up to set email alerts
|

Instruction set extensions for the advanced encryption standard on a multithreaded software defined radio platform

Abstract: Software-defined radio (SDR) is an emerging technology that facilitates having multiple wireless communication protocols on one device. Previous work has shown that current W-CDMA, GPS, GSM, and WiMAX applications can run on this class of device while consuming significant processing power. Next generation wireless networks require speeds in excess of 50Mbps. Some of the fastest AES software implementations only achieve 20Mbps on our reference platform. In order to have secure software-defined radio, the secur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 24 publications
0
1
0
Order By: Relevance
“…Considering the fact that cryptography – by its very nature – is always ever-changing, the need for a flexible platform that can implement a wide range of cryptographic primitives, algorithms, and protocols was soon recognized. Since the late 90s, activities concerning the implementation of multiple security algorithms have centred around three main approaches: Customized General Purpose Processor (GPP) [6] , [7] , [8] , [9] , [10] , [11] , [12] , Crypto Co-processor [13] , [14] , [15] , [16] , and Crypto Processor [17] , [18] , [19] , [20] , [21] . While throughput was almost always the prime metric, other figures of merit were sought such as flexibility and security.…”
Section: Introductionmentioning
confidence: 99%
“…Considering the fact that cryptography – by its very nature – is always ever-changing, the need for a flexible platform that can implement a wide range of cryptographic primitives, algorithms, and protocols was soon recognized. Since the late 90s, activities concerning the implementation of multiple security algorithms have centred around three main approaches: Customized General Purpose Processor (GPP) [6] , [7] , [8] , [9] , [10] , [11] , [12] , Crypto Co-processor [13] , [14] , [15] , [16] , and Crypto Processor [17] , [18] , [19] , [20] , [21] . While throughput was almost always the prime metric, other figures of merit were sought such as flexibility and security.…”
Section: Introductionmentioning
confidence: 99%