Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Dataflow Partitioning and Scheduling Algorithms for WASMII, a Virtual Hardware

    This paper presents a new dataflow graph partitioning algorithm for a data driven virtual hardware system called WASMII. The algorithm divides a dataflow graph into multiple subgraphs so as not to cause a dead...

    Atsushi Takayama, Yuichiro Shibata in Field-Programmable Logic and Applications:… (2000)

  2. No Access

    Chapter and Conference Paper

    Power Efficiency Evaluation of Block Ciphers on GPU-Integrated Multicore Processor

    Computer systems with discrete GPUs are expected to become the standard methodology for high-speed encryption processing, but they require large amounts of power consumption and are inapplicable to embedded de...

    Naoki Nishikawa, Keisuke Iwai in Algorithms and Architectures for Parallel … (2012)

  3. No Access

    Chapter and Conference Paper

    Information Theoretical Analysis of Side-Channel Attack

    This paper presents a proposal of a new information-the-oretical evaluation method for the side-channel resistance. This method provides some benefits: (1) It provides a rationale for evaluation. (2) Moreover,...

    Hiroaki Mizuno, Keisuke Iwai, Hidema Tanaka in Information Systems Security (2013)

  4. No Access

    Chapter and Conference Paper

    Performance Prediction Model for Block Ciphers on GPU Architectures

    This paper presents a proposal of a performance prediction model of block ciphers on GPU architectures. The model comprises three phases: micro-benchmarks, analyzing code, and performance equations. Micro-benc...

    Naoki Nishikawa, Keisuke Iwai, Hidema Tanaka in Network and System Security (2013)

  5. No Access

    Chapter and Conference Paper

    Search Algorithm of Precise Integral Distinguisher of Byte-Based Block Cipher

    Integral distinguisher is the main factor of integral attack. Conventionally, first order integral distinguisher is obtained and higher order integral distinguisher is derived from extension of first order (co...

    Haruhisa Kosuge, Keisuke Iwai, Hidema Tanaka in Information Systems Security (2015)

  6. No Access

    Chapter and Conference Paper

    Implementation of Bitsliced AES Encryption on CUDA-Enabled GPU

    Table-based implementations have been mainly reported in research related to high-performance AES on GPUs, in which tables are stored in the shared memory. On the other hand, this kind of implementations is su...

    Naoki Nishikawa, Hideharu Amano, Keisuke Iwai in Network and System Security (2017)