Enhancing the Performance of Encryption for Embedded Processors from the View of ISA
碩士 === 逢甲大學 === 電機工程所 === 90 === Encryption algorithms always use the technique of table lookup to perform substitution, confusion primitive. The use of table lookup is more evident in the new encryption algorithms, such as the AES finalists like Twofish, MARS, and Rijndael. A preview study about th...
Main Authors: | Chia-Hua Liu, 劉嘉樺 |
---|---|
Other Authors: | Lerry Wang |
Format: | Others |
Language: | zh-TW |
Published: |
2002
|
Online Access: | http://ndltd.ncl.edu.tw/handle/45nc5f |
Similar Items
-
DESIGN OF AN EMBEDDED PROCESSOR FOR ADVANCED ENCRYPTION STANDARD
by: Chung-Chu Chia, et al.
Published: (2005) -
ACE: ARIA-CTR Encryption for Low-End Embedded Processors
by: Hwajeong Seo, et al.
Published: (2020-07-01) -
Leveraging Processor-diversity For Improved Performance In Heterogeneous-ISA Systems
by: Pang, Yihan
Published: (2019) -
Microarchitecture and Compiler Techniques for Dual Width ISA Processors
by: Krishnaswamy, Arvind
Published: (2006) -
Processors Allocation for MPSoCs With Single ISA Heterogeneous Multi-Core Architecture
by: Yi-Jung Chen, et al.
Published: (2017-01-01)