Cipher Algorithm Implementation
暂无分享,去创建一个
This article describes cipher-implementation technology. When implementing ciphers one must carefully consider the usage environment and security policies in order to strike a balance between implementation scope and performance. Two types of cipher implementation (in software and in hardware) are discussed here, and we conclude by touching upon reusable design assets (intellectual properties) in hardware implementation, which has been the focus of so much attention recently.
[1] Akashi Satoh,et al. A Compact Rijndael Hardware Architecture with S-Box Optimization , 2001, ASIACRYPT.
[2] Mitsuru Matsui,et al. Hardware Evaluation of the AES Finalists , 2000, AES Candidate Conference.
[3] Richard Weiss,et al. A Comparison of AES Candidates on the Alpha 21264 , 2000, AES Candidate Conference.