搜索结果: 1-8 共查到“军事学 SIMD”相关记录8条 . 查询时间(0.062 秒)
Improved SIMD Implementation of Poly1305
MAC Poly1305 Horner
font style='font-size:12px;'>
2019/7/22
Poly1305 is a polynomial hash function designed by Bernstein in 2005. Presently, it is part of several major platforms including the Transport Layer Security protocol. Vectorised implementation of Pol...
Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation
Diffusion matrix algebraic-geometry codes algebraic curves
font style='font-size:12px;'>
2016/1/8
This paper investigates large linear mappings with very good diffusion and efficient software
implementations, that can be used as part of a block cipher design. The mappings are derived from linear
...
Use of SIMD-Based Data Parallelism to Speed up Sieving in Integer-Factoring Algorithms
Integer Factorization Sieving Multiple-Polynomial Quadratic Sieve Method
font style='font-size:12px;'>
2016/1/4
Many cryptographic protocols derive their security from the apparent
computational intractability of the integer factorization problem. Currently,
the best known integer-factoring algorithms run in ...
Efficient Modular Arithmetic for SIMD Devices
Fast Modular Arithmetic Improvements of Montgomery Reduction
font style='font-size:12px;'>
2014/3/7
This paper describes several new improvements of modular arithmetic and how to exploit them in order to gain more efficient implementations of commonly used algorithms, especially in cryptographic app...
Fully Homomorphic SIMD Operations
public-key cryptography
font style='font-size:12px;'>
2012/3/29
At PKC 2010 Smart and Vercauteren presented a variant of Gentry's fully homomorphic public key encryption scheme and mentioned that the scheme could support SIMD style operations. The slow key generat...
Security Analysis of SIMD
secret-key cryptography SIMD SHA-3 hash function distinguisher security proof with distinguishers
font style='font-size:12px;'>
2010/7/13
In this paper we study the security of the SHA-3 candidate SIMD. We first show a new free-start distinguisher based on symmetry relations. It allows to distinguish the compression function of SIMD fro...
Cryptanalysis of the Compression Function of SIMD
SIMD SHA-3 Candidate near collision distinguishing attack
font style='font-size:12px;'>
2010/7/13
SIMD is one of the second round candidates of the SHA-3 competition hosted by NIST. In this paper, we present some results on the compression function of SIMD 1.1 (the tweaked version) using the modul...
High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash,ECHO, Fugue, Grstl, Hamsi, JH, Keccak,Lua, Shabal, SHAvite-3, SIMD, and Skein Version 2.0, November 11, 2009
SHA-3 round 2 hardware
font style='font-size:12px;'>
2009/11/18
In this paper we describe our high-speed hardware implementations
of the 14 candidates of the second evaluation round of the
SHA-3 hash function competition. We synthesized all implementations
usin...