• Corpus ID: 11218428

NIST Performance Analysis of the Final Round JavaTM AES Candidates

@inproceedings{Dray2000NISTPA,
  title={NIST Performance Analysis of the Final Round JavaTM AES Candidates},
  author={James F. Dray},
  booktitle={AES Candidate Conference},
  year={2000}
}
  • J. Dray
  • Published in AES Candidate Conference 2000
  • Computer Science
NIST solicited candidate algorithms for the Advanced Encryption Standard (AES) in a Federal Register Announcement dated September 12, 1997[1]. Fifteen of the submissions were deemed “complete and proper” as defined in the Announcement, and entered the first round of the AES selection process in August 1998. Since that time, NIST has been working with a worldwide community of cryptographers to evaluate the submissions according to the criteria established in[1]. Five candidates were subsequently… 

Report on the Development of the Advanced Encryption Standard (AES)

TLDR
Having reviewed further public analysis of the finalists, NIST has decided to propose Rijndael as the Advanced Encryption Standard (AES).

Efficient Implementation of Galois Field Fixed Field Constant Multiplication

  • A. J. ElbirtC. Paar
  • Computer Science
    Third International Conference on Information Technology: New Generations (ITNG'06)
  • 2006
TLDR
A hardware architecture is presented that achieves efficient implementation of generalized Galois field fixed field constant multiplication, a core operation of Rijndael, chosen by the National Institute of Standards and Technology (NIST) as the advanced encryption standard (AES) advanced encryption algorithm in October of 2000.

Fast and Efficient Implementation of AES via Instruction Set Extensions

  • A. J. Elbirt
  • Computer Science
    21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)
  • 2007
TLDR
A general purpose instruction set extension to a 32-bit SPARC V8 compatible processor core is presented that accelerates the performance of Galois Field fixed field constant multiplication, a core element of the AES algorithm.

Enhancing the Performance of Symmetric-Key Cryptography via Instruction Set Extensions

TLDR
Results show that the utilization of the proposed instructions significantly reduces program code size, and improves encryption and decryption throughput, and allows for seamless and transparent algorithm agility as one algorithm may be easily replaced by another algorithm with minimal performance degradation.

The research and design of reconfigurable computing for Block cipher

TLDR
System performance has been analyzed, and from the analysis it is demonstrated that the RCBA architecture can achieve more flexibility and efficiency when compared with other implementations.

Accelerated Flexible Co-Processor Architecture for Crypto Information

TLDR
A core of AFPC (Accelerated Flexible Co-Processor Architecture for Crypto Information) architecture is presented which was developed with respect to speed and flexibility of crypto information, including symmetric-key cipher algorithms and Hash functions, and the results prove that AFPC can achieve relatively high performance in cipher algorithms processing.

Instruction-level distributed processing for symmetric-key cryptography

  • A. J. ElbirtC. Paar
  • Computer Science
    Proceedings International Parallel and Distributed Processing Symposium
  • 2003
TLDR
It is demonstrated that the COBRA architecture satisfies the requirements for achieving efficient implementation of a wide range of block ciphers that meet the 622 Mbps ATM network encryption throughput requirement.

A new cryptographic algorithm for the real time applications

TLDR
A new cryptographic algorithm is developed to improve the time for encryption and decryption of data of end-to-end delay and provide higher level of security for real time applications.

An instruction-level distributed processor for symmetric-key cryptography

  • A. J. ElbirtC. Paar
  • Computer Science, Mathematics
    IEEE Transactions on Parallel and Distributed Systems
  • 2005
TLDR
A hardware architecture that achieves efficient block cipher implementation while maintaining flexibility through reconfiguration is presented, and it will be demonstrated that the COBRA architecture satisfies the requirements for achieving efficient implementation of a wide range of block ciphers that meet the 622 Mbps ATM network encryption throughput requirement.

The Research And Design Of Reconfigurable Cryptographic Chip Based On Block Cipher

  • Xiaohui YangZ. DaiXuerong Yu
  • Computer Science
    2006 8th International Conference on Solid-State and Integrated Circuit Technology Proceedings
  • 2006
This paper describes the RCBA architecture, a new specialized reconfigurable architecture for block cipher that bridges the cost and performance gap between general purpose and application specific

References

SHOWING 1-8 OF 8 REFERENCES

AES Java Technology Comparisons

TLDR
This paper makes recommendations to the NIST about which candidates be considered during the second round of the selection process, according to criteria des in the rest of this paper.

Report on the NIST JavaTM AES Candidate Algorithm Analysis

  • 1999

Performance Analysis of Java Implementations of the Second Round AES Candidate Algorithms

  • Performance Analysis of Java Implementations of the Second Round AES Candidate Algorithms
  • 2000

Standard Edition Documentation (Version 1.3), http://java.sun.com/products/jdk/1.3/docs

  • Standard Edition Documentation (Version 1.3), http://java.sun.com/products/jdk/1.3/docs

AES JavaTM Technology Comparisons

  • Proceedings of the Second Advanced Encryption Standard Candidate Conference, March
  • 1999

Java Performance of AES Candidates”, Submitted to NIST via email in response to the call for public comments on the AES

  • 1999

Java Performance of AES Candidates Submitted to NIST via email in response to the call for public comments on the AES candidates

  • Java Performance of AES Candidates Submitted to NIST via email in response to the call for public comments on the AES candidates
  • 1999

Report on the NIST Java™ AES Candidate Algorithm Analysis

  • Report on the NIST Java™ AES Candidate Algorithm Analysis
  • 1999