2004
DOI: 10.1007/978-3-540-24714-2_15
|View full text |Cite
|
Sign up to set email alerts
|

Cryptonite – A Programmable Crypto Processor Architecture for High-Bandwidth Applications

Abstract: Cryptography was and still is one of the most interesting fields in Computer Science-related research. Where its origin lies in military and governmental use, today cryptography is widely used in everyday life. Cryptography secures communication between smart cards and card readers. It scrambles transmissions between DECT telephones and their base stations, it even entered the living rooms through digital Pay TV channels which use cryptographic methods to make sure that only their subscribers can watch their t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2006
2006
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(12 citation statements)
references
References 27 publications
0
12
0
Order By: Relevance
“…An other example is Cryptonite [4]. It is a programmable VLIW crypto-processor that supports AES, DES, MD5 and others cryptographic algorithms.…”
Section: B Previous Workmentioning
confidence: 99%
“…An other example is Cryptonite [4]. It is a programmable VLIW crypto-processor that supports AES, DES, MD5 and others cryptographic algorithms.…”
Section: B Previous Workmentioning
confidence: 99%
“…Specific execution units are added into the datapath. [6] and [7] propose processors with instructions for symmetric ciphering algorithms. Specific instructions have been defined like logical operation (xor-add) or data permutation.…”
Section: ) Dedicated Processorsmentioning
confidence: 99%
“…Despite the huge success of these assumptions, the technology landscape has now changed radically: the types of program we execute today are different and many of the constraints which guided initial thinking have disappeared. This is certainly true of cryptographic workloads as evidenced by previous work on application specific processors such as CryptoManiac [36] and Cryptonite [8].…”
Section: Crispmentioning
confidence: 80%
“…In recent years, custom instructions for secret-key cryptography have been integrated into a wide variety of platforms, ranging from high-performance ASIPs to [8] is an ASIP dedicated to cryptographic algorithms 1 and not a general-purpose processor with crypto extensions like CRISP. On the other hand, the custom instructions described in [4,13,35] were designed for integration into general-purpose processors, but their applicability is restricted to a single cryptosystem (AES), while the instructions introduced in this paper allow one to accelerate any cryptographic algorithm that can be implemented via bit-slicing.…”
Section: Comparison and Discussionmentioning
confidence: 99%
See 1 more Smart Citation