Annual Computer Security Applications Conference 2021
DOI: 10.1145/3485832.3485897
|View full text |Cite
|
Sign up to set email alerts
|

VASA: Vector AES Instructions for Security Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 69 publications
0
1
0
Order By: Relevance
“…To give a rough runtime estimation, the PRG can be instantiated using two calls to fixed-key AES. According to [MSY21], using the AES-NI instructions of modern CPUs, one byte of AES-128 can be computed in ∼ 1.3 cycles. Hence, computing 3.6 • 10 5 blocks of 16 bytes requires about 7.5 • 10 6 cycles.…”
Section: New Cost Estimations For Pcfs and Challengesmentioning
confidence: 99%
“…To give a rough runtime estimation, the PRG can be instantiated using two calls to fixed-key AES. According to [MSY21], using the AES-NI instructions of modern CPUs, one byte of AES-128 can be computed in ∼ 1.3 cycles. Hence, computing 3.6 • 10 5 blocks of 16 bytes requires about 7.5 • 10 6 cycles.…”
Section: New Cost Estimations For Pcfs and Challengesmentioning
confidence: 99%
“…For SS-based MPC, a similar segmentation that was initiated by [8], [50], [82] lets the parties generate correlated randomness in the setup phase which later speeds up the online phase regarding communication, interactive rounds and hence also run time. These works started a rich line of work on increasingly efficient MPC protocols in the preprocessing model [23], [33], [53], [54], [62], [68], [70], [75], [76]. Some works, most notably LUT-based protocols [33], even have a function-dependent setup phase, i.e., they assume the parties already know the function during setup [11], [58], [68], [86].…”
Section: Related Workmentioning
confidence: 99%
“…The Advanced Encryption Standard (AES) [17], LabVIEW [18], myRIO board [19], SystemLink Cloud technology [20], Wi-Fi communication, and additional multidimensional approaches are integrated into the proposed approach to ensure the security of smart solar energy system monitoring. One of the most popular and extensively used symmetric block encryption algorithms worldwide is the Advanced Encryption Standard (AES) algorithm [21]. This method has a unique structure when it comes to encrypting and decrypting sensitive data.…”
mentioning
confidence: 99%