Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Reconfigurable computing: a survey of systems and software
ACM Computing Surveys (CSUR)
FPGA '03 Proceedings of the 2003 ACM/SIGDA eleventh international symposium on Field programmable gate arrays
FPGA '03 Proceedings of the 2003 ACM/SIGDA eleventh international symposium on Field programmable gate arrays
A Massively Parallel RC4 Key Search Engine
FCCM '02 Proceedings of the 10th Annual IEEE Symposium on Field-Programmable Custom Computing Machines
Efficient FPGA Implementation of Block Cipher MISTY1
IPDPS '03 Proceedings of the 17th International Symposium on Parallel and Distributed Processing
Internet Security: Cryptographic Principles, Algorithms and Protocols
Internet Security: Cryptographic Principles, Algorithms and Protocols
Security in Fixed and Wireless Networks: An Introduction to securing data communications
Security in Fixed and Wireless Networks: An Introduction to securing data communications
A Novel Image Encryption Scheme Based-on JPEG Encoding
IV '04 Proceedings of the Information Visualisation, Eighth International Conference
Two-Stage Reconfigurable Computing System Architecture
ICSENG '05 Proceedings of the 18th International Conference on Systems Engineering
Immunizing public key cryptosystems against chosen ciphertext attacks
IEEE Journal on Selected Areas in Communications
ID-based cryptographic schemes for user identification, digital signature, and key distribution
IEEE Journal on Selected Areas in Communications
A virtual image cryptosystem based upon vector quantization
IEEE Transactions on Image Processing
Hi-index | 0.00 |
Cryptosystem is a system that needs a secure software and hardware environment. The performance of hardware has made great progress year by year. Hence, it is important to change the architecture of cryptosystem and complicate the computation of cryptography algorithm to catch the trend of modern hardware. If the system is built with software then it is not difficult to change the architecture and complicate the computation. However, in this way, the main disadvantage is poor performance. Using hardware to design a cryptosystem is a good choice because it is highly more secure and efficient than software, but it is a fixed system that cannot be changed. So, it is an important topic to implement a flexible, secure, and efficient cryptosystem which can coordinate with novel hardware. In this article, a new method to implement cryptosystems based on hardware design is proposed. It can fast implement a new cryptosystem because it separates system into two levels: one is system architecture and the other is system algorithm. To combine different architectures and algorithms can implement varied cryptosystems. Otherwise, to split architectures and algorithms will lead to improve the security of system. An application of data transfer between stream cipher and block cipher is also implemented in this system and successfully verified the flexibility, security, and efficiency of this proposed method.