Back to Results
First PageMeta Content
Trivium / Throughput / Algorithm / Crypt / Applied mathematics / Stream ciphers / Mathematics / Achterbahn


Hardware Evaluation of eS TREAM Candidates: Achterbahn, Grain, M ICKEY, M OSQUITO , S FINKS , Trivium, V EST, ZK-Crypt Frank K. Gürkaynak1, Peter Luethi1 , Nico Bernold2 , René Blattmann2 , Victoria Goode2, Marcel Marg
Add to Reading List

Document Date: 2006-02-13 07:41:31


Open Document

File Size: 126,78 KB

Share Result on Facebook

City

Zurich / /

Company

Wolfgang Fichtner1 (1 ) Integrated Systems Laboratory / ABC / M AG / Integrated Systems Laboratory / Synopsys / Mentor Graphics / /

Facility

Integrated Systems Laboratory / /

IndustryTerm

µm technology / compact algorithm / otherwise secure cryptographic algorithm / manufacturing technologies / identical technology / dedicated synthesis tools / programmable devices / cryptographic algorithm / fair comparison between different algorithms / pure software implementations / hardware crypto algorithms / technology-dependent unit delay / hardware-efficient cryptographic algorithm / target technology / a lot of cryptographic algorithms / process technology / target hardware / cryptographic hardware / stream cipher algorithms / candidate algorithms / hardware technologies / /

NaturalFeature

eS TREAM stream / /

Organization

Department of Information Technology and Electrical Engineering / Microelectronics Design Center / ASIC / US Federal Reserve / /

Person

Elisabeth Oswald / Victoria Goode / Peter Lüthi / Marcel Marghitola / Rene Blattmann / Nico Bernold / Matt Robshaw / S FINKS / V / Frank K. Gürkaynak / Thomas Johansson / /

Position

golden model for verification / hardware designer / designer / straight-forward / representative / /

Product

F16 / /

ProgrammingLanguage

L / /

RadioStation

R AM / /

Technology

stream cipher algorithms / candidate algorithms / Three algorithms / implemented algorithms / remaining five Profile-II algorithms / eight implemented algorithms / ES algorithm / remaining algorithms / Information Technology / otherwise secure cryptographic algorithm / remaining 12 algorithms / process technology / MOS technology / remaining 5 algorithms / all 34 candidate algorithms / cryptographic algorithm / hardware technologies / Encryption / hardware crypto algorithms / 3 Algorithms / Cryptography / 0.25 µm technology / ASIC / 34 algorithms / seven algorithms / eventually seven eS TREAM candidate algorithms / target technology / compact algorithm / manufactured chips / radix-1 algorithms / a lot of cryptographic algorithms / simulation / DSP / stream cipher / /

SocialTag