This work was supported in part by the China Ministry of Science and Technology under Grant 2015GA600002。
The cache-based covert channel is one of the common vulnerabilities exploited in the Spectre attacks.Current mitigation strategies focus on blocking the eviction-based channel by using a random/encrypted mapping funct...
supported by National Natural Science Foundation of China with granted No.61404175
As an important branch of information security algorithms,the efficient and flexible implementation of stream ciphers is vital.Existing implementation methods,such as FPGA,GPP and ASIC,provide a good support,but they ...
supported in part by open project foundation of State Key Laboratory of Cryptology; National Natural Science Foundation of China (NSFC) under Grant No. 61272492, No. 61572521 and No. 61309008;Natural Science Foundation for Young of Shaanxi Province under Grant No. 2013JQ8013
Matrix multiplication plays a pivotal role in the symmetric cipher algorithms, but it is one of the most complex and time consuming units, its performance directly affects the efficiency of cipher algorithms. Combined...
The National High-Tech Research and Development Program of China(863 Program)2014AA01A705
Processors have been playing important roles in both communication infrastructure systems and terminals.In this paper,both application specific and general purpose processors for communications are discussed including...
supported by National Natural Science Foundation of China with granted No.61404175
An Efficient and flexible implementation of block ciphers is critical to achieve information security processing.Existing implementation methods such as GPP,FPGA and cryptographic application-specific ASIC provide the...
This paper presents a method to reduce the energy consumption of multi-core systems characterized by processor cores and buses with discrete frequency levels under timing constraints.The proposed method takes the tran...
This paper reviews the requirements for Software Defi ned Radio (SDR) systems for high-speed wireless applications and compares how well the different technology choices available-from ASICs, FPGAs to digital signal p...