Security as a new dimension in embedded system design
Proceedings of the 41st annual Design Automation Conference
Fast Bit Gather, Bit Scatter and Bit Permutation Instructions for Commodity Microprocessors
Journal of Signal Processing Systems
Security analysis of the full-round DDO-64 block cipher
Journal of Systems and Software
Hi-index | 0.00 |
New and emerging applications can change the mix ofoperations commonly used within computer architectures.It is sometimes surprising when instruction-set architecture(ISA) innovations intended for one purpose are used forother (initially unintended) purposes. This paper considersrecent proposals for the processor support of familiesof bit-level permutations. From a processor architecturepoint of view, the ability to support very fast bit-level permutationsmay be viewed as a further validation of the basicword-orientation of processors, and their ability to supportnext-generation secure multimedia processing. However,bitwise permutations are also fundamental operationsin many cryptographic primitives and we discuss the suitabilityof these new operations for cryptographic purposes.