A Novel RISC Processor with Crypto Specific Instruction Set

Provided by: International Journal of Soft Computing and Engineering (IJSCE)
Topic: Security
Format: PDF
Old-time necessity for security and data protection against unauthorized access to classified information in many industries especially in military application is undeniably sobering. Hence, cryptography plays a significantly important role in, the security of data transmission. On one hand, with developing computing technology, implementation of sophisticated cryptographic algorithms has become feasible. On the other hand, stronger cryptographic specifications are needed in order to be reluctant to possible threats. Some well-known examples of cryptographic algorithms are DES and AES.

Find By Topic