Advanced Bit Manipulation Instruction Set Architecture
暂无分享,去创建一个
[1] Y. Hilewitz,et al. Comparing fast implementations of bit permutation instructions , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..
[2] Weblog Wikipedia,et al. In Wikipedia the Free Encyclopedia , 2005 .
[3] Ruby B. Lee,et al. Instruction set architecture for accelerating cryptographic processing in wireless computing devices , 2005 .
[4] Ruby B. Lee,et al. Implementation complexity of bit permutation instructions , 2003, The Thrity-Seventh Asilomar Conference on Signals, Systems & Computers, 2003.
[5] Ruby B. Lee,et al. Subword sorting with versatile permutation instructions , 2002, Proceedings. IEEE International Conference on Computer Design: VLSI in Computers and Processors.
[6] Ruby B. Lee,et al. Fast parallel table lookups to accelerate symmetric-key cryptography , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[7] Ruby B. Lee,et al. Single-Cycle Bit Permutations with MOMR Execution , 2005, Journal of Computer Science and Technology.
[8] J. van Leeuwen,et al. Information Hiding , 1999, Lecture Notes in Computer Science.
[9] Ruby B. Lee,et al. Fast Bit Compression and Expansion with Parallel Extract and Parallel Deposit Instructions , 2006, IEEE 17th International Conference on Application-specific Systems, Architectures and Processors (ASAP'06).
[10] Ruby B. Lee,et al. Fast subword permutation instructions using omega and flip network stages , 2000, Proceedings 2000 International Conference on Computer Design.
[11] Ruby B. Lee,et al. Efficient permutation instructions for fast software cryptography , 2001 .
[12] Ruby B. Lee,et al. Arbitrary bit permutations in one or two cycles , 2003, Proceedings IEEE International Conference on Application-Specific Systems, Architectures, and Processors. ASAP 2003.
[13] Ruby B. Lee,et al. On-chip lookup tables for fast symmetric-key encryption , 2005, 2005 IEEE International Conference on Application-Specific Systems, Architecture Processors (ASAP'05).
[14] Ruby B. Lee,et al. Bit permutation instructions: architecture, implementation, and cryptographic properties , 2004 .
[15] Ronald L. Rivest,et al. On permutation operations in cipher design , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[16] Ingo Stierand,et al. Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best , 1996, Information Hiding.
[17] Ruby B. Lee. Subword parallelism with MAX-2 , 1996, IEEE Micro.
[18] Ruby B. Lee. Subword permutation instructions for two-dimensional multimedia processing in MicroSIMD architectures , 2000, Proceedings IEEE International Conference on Application-Specific Systems, Architectures, and Processors.
[19] Ruby B. Lee,et al. Performing Advanced Bit Manipulations Efficiently in General-Purpose Processors , 2007, 18th IEEE Symposium on Computer Arithmetic (ARITH '07).
[20] Xiao Yang,et al. How a processor can permute n bits in O(1) cycles , 2002 .
[21] Simon Josefsson,et al. The Base16, Base32, and Base64 Data Encodings , 2003, RFC.
[22] Ruby B. Lee,et al. Bit permutation instructions for accelerating software cryptography , 2000, Proceedings IEEE International Conference on Application-Specific Systems, Architectures, and Processors.