A Comprehensive Framework for Fair and Efficient Benchmarking of Hardware Implementations of Lightweight Cryptography
暂无分享,去创建一个
Kris Gaj | Michael Tempelmeier | William Diehl | Jens-Peter Kaps | Farnoud Farahmand | Ekawat Homsirikamol
[1] Kris Gaj,et al. A universal hardware API for authenticated ciphers , 2015, 2015 International Conference on ReConFigurable Computing and FPGAs (ReConFig).
[2] Takeshi Sugawara,et al. Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates , 2012, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[3] Kris Gaj,et al. Improved Lightweight Implementations of CAESAR Authenticated Ciphers , 2018, 2018 IEEE 26th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM).
[4] John Pham,et al. Lightweight Implementations of SHA-3 Candidates on FPGAs , 2011, INDOCRYPT.
[5] Jens-Peter Kaps,et al. Evaluation of the CAESAR hardware API for lightweight implementations , 2017, 2017 International Conference on ReConFigurable Computing and FPGAs (ReConFig).
[6] Georg Sigl,et al. Experimental Power and Performance Evaluation of CAESAR Hardware Finalists , 2018, 2018 International Conference on ReConFigurable Computing and FPGAs (ReConFig).
[7] Kris Gaj,et al. Minerva: Automated hardware optimization tool , 2017, 2017 International Conference on ReConFigurable Computing and FPGAs (ReConFig).
[8] Kris Gaj,et al. Comprehensive Evaluation of High-Speed and Medium-Speed Implementations of Five SHA-3 Finalists Using Xilinx and Altera FPGAs , 2012, IACR Cryptol. ePrint Arch..
[9] Kris Gaj,et al. Face-off Between the CAESAR Lightweight Finalists: ACORN vs. Ascon , 2018, 2018 International Conference on Field-Programmable Technology (FPT).
[10] William P. Marnane,et al. FPGA Implementations of the Round Two SHA-3 Candidates , 2010, 2010 International Conference on Field Programmable Logic and Applications.
[11] Kris Gaj,et al. CAESAR Hardware API , 2016, IACR Cryptol. ePrint Arch..
[12] Kris Gaj,et al. Comparison of cost of protection against differential power analysis of selected authenticated ciphers , 2018, 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[13] Georg Sigl,et al. The CAESAR-API in the real world — Towards a fair evaluation of hardware CAESAR candidates , 2018, 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[14] Elena Trichina,et al. Combinational Logic Design for AES SubByte Transformation on Masked Data , 2003, IACR Cryptol. ePrint Arch..
[15] Kris Gaj,et al. Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs , 2010, CHES.
[16] Vincent Rijmen,et al. Threshold Implementations Against Side-Channel Attacks and Glitches , 2006, ICICS.