2006
DOI: 10.1007/11787952_21
|View full text |Cite
|
Sign up to set email alerts
|

A Vector Approach to Cryptography Implementation

Abstract: Abstract. The current deployment of Digital Right Management (DRM) schemes to distribute protected contents and rights is leading the way to massive use of sophisticated embedded cryptographic applications. Embedded microprocessors have been equipped with bulky and powerconsuming co-processors designed to suit particular data sizes. However, flexible cryptographic platforms are more desirable than devices dedicated to a particular cryptographic algorithm as the increasing cost of fabrication chips favors large… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2006
2006
2007
2007

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…2. We have used the acronym VeMICry, for Vectorial MIPS for Cryptography [20]. In essence, VeMICry comprises a simple MIPS-I processor [21] implementing usual, "scalar" instructions, together with a vector coprocessor for the vector instructions.…”
Section: A Vector Processor For Elliptic Curve Cryptographymentioning
confidence: 99%
See 3 more Smart Citations
“…2. We have used the acronym VeMICry, for Vectorial MIPS for Cryptography [20]. In essence, VeMICry comprises a simple MIPS-I processor [21] implementing usual, "scalar" instructions, together with a vector coprocessor for the vector instructions.…”
Section: A Vector Processor For Elliptic Curve Cryptographymentioning
confidence: 99%
“…As the name suggests, vector instructions operate on vectors of registers rather than on individual registers. A total of 17 vector instructions have been defined for VeMICry; a full list is provided in [20]. A few examplesrelevant to public key cryptography -are:…”
Section: A Vector Processor For Elliptic Curve Cryptographymentioning
confidence: 99%
See 2 more Smart Citations
“…Vector processors have been considered for implementation of symmetric algorithms such as DES [4], and cryptography in general [5], which yielded some performance increase. Recently, Costigan and Scott [6] implemented RSA using the vector units of the Cell processor.…”
Section: Previous Workmentioning
confidence: 99%