2010 2nd International Conference on Computer Engineering and Technology 2010
DOI: 10.1109/iccet.2010.5486259
|View full text |Cite
|
Sign up to set email alerts
|

Parallel AES algorithm for fast Data Encryption on GPU

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
2
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(8 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…The exchange of keys between CPU and GPU may be a concern for some applications and should be analyzed very carefully. Power issues were not addressed in Cook et al [2005], Manavski [2007], and Deguang et al [2010], but this point should also be analyzed to evaluate its impact on the global power budget.…”
Section: Crypto Coprocessorsmentioning
confidence: 99%
See 1 more Smart Citation
“…The exchange of keys between CPU and GPU may be a concern for some applications and should be analyzed very carefully. Power issues were not addressed in Cook et al [2005], Manavski [2007], and Deguang et al [2010], but this point should also be analyzed to evaluate its impact on the global power budget.…”
Section: Crypto Coprocessorsmentioning
confidence: 99%
“…Some interesting works have considered the use of a GPU as a crypto processor combined with a CPU [Cook et al 2005;Manavski 2007;Deguang et al 2010]. Such approaches are motivated by the widespread adoption of GPUs in many embedded systems.…”
Section: Crypto Coprocessorsmentioning
confidence: 99%
“…et. al., "Parallel AES Algorithm for Fast Data Encryption on GPU", 2010 [4] The researchers proposed a new algorithm for AES parallel encryption based on technologies of GPU parallel computing that designed and implemented a fast data encryption system. The test proves that proposed approach can accelerate the speed of AES encryption significantly.…”
Section: Related Workmentioning
confidence: 99%
“…Its importance is further understood by its use in numerous security protocols and systems, including SSL/TLS for internet security, VPNs for secure remote access, and encrypted storage solutions. The strength and versatility of AES make it a cornerstone of data protection in the digital age [14]. As network speeds soar into the gigabits-persecond (Gbps) range, software implementations of cryptographic algorithms struggle to keep pace [15].…”
Section: Introductionmentioning
confidence: 99%
“…In [2], a comparative study shows that the hardware implementation of the AES algorithm is significantly faster when compared to its software implementation. In recent years, many hardware-based implementations have been proposed in literature [11][12][13][14][15][16][17][18][19][20][21][22][23]. Papers [3][4][5], implementing the said algorithm on different FPGA boards, successfully obtaining high throughput as high as around 30Gbps.…”
Section: Introductionmentioning
confidence: 99%