Jason R. Hamlet

Learn More
We present several software and hardware implementations of QUAD, a recently introduced stream cipher designed to be provably secure and practical to implement. The software implementations target both a personal computer and an ARM microprocessor. The hardware implementations target field-programmable gate arrays. The purpose of our work was to first find(More)
Current cyber defenses result in binary access for attackers who have compromised a host: either the attacker has full access to the machine or the intrusion is detected and the machine is removed from the network. This is the result of an apparent duality when determining if a system is compromised; i.e., either it is or it is not. However, analysts(More)
We present several software and hardware implementations of QUAD, a recently introduced stream cipher designed to be provably secure and practical to implement. The software implementations target both a personal computer and an ARM microprocessor. The hardware implementations target field programmable gate arrays. The purpose of our work was to first find(More)
Dozens of Advanced Encryption Standard (AES) implementations have been presented since AES was officially published by the National Institute of Standards and Technology in 2001. Many of these implementations have targeted FPGA platforms either for ASIC prototyping or as the destination hardware. Typically, these publications have comparative metrics to(More)
  • 1