dc.contributor.author |
Singh, Mahendra Pratap |
|
dc.contributor.author |
Jain, Manoj Kumar |
|
dc.date.accessioned |
2016-03-16T07:02:52Z |
|
dc.date.available |
2016-03-16T07:02:52Z |
|
dc.date.issued |
2014-10 |
|
dc.identifier.issn |
2350-0077 |
|
dc.identifier.uri |
http://27.109.7.66:8080/xmlui/handle/123456789/213 |
|
dc.description |
Journal of Basic and Applied Engineering Research
Print ISSN: 2350-0077; Online ISSN: 2350-0255; Volume 1, Number 6; October, 2014 pp. 90-93
© Krishi Sanskriti Publications
http://www.krishisanskriti.org/jbaer.html |
en_US |
dc.description.abstract |
Security in data communication is of utmost importance and is achieved using cryptographic algorithms while preserving confidentiality and integrity of data. In processors those implement cryptographic algorithms; critical computations are migrated from processor core to an application specific unit for performing computing-intensive task efficiently where each unit executes application specific instruction set extensions. Instruction set extension is one of the ways to improve the performance of processors running cryptographic applications. It is an effective way to execute computing intensive task of encryption and decryption. There is a significant performance improvement using instruction set extensions like Intel’s AES-NI (Advanced Encryption Standard New Instructions) as compared to other software implementations. This paper is an attempt to survey the available instruction set extensions used in cryptographic applications and to identify some of the issues which needs to be addressed. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Krishi Sanskriti Publications |
en_US |
dc.subject |
Instruction Set Extensions |
en_US |
dc.subject |
AES |
en_US |
dc.subject |
ECC |
en_US |
dc.title |
Instruction set extensions for cryptographic applications: survey and issues |
en_US |
dc.type |
Article |
en_US |