Computation-Communication Overlapping in AES-CCM Using Thread-Level Parallelism on a Multi-Core Processor
![]() |
Lee, Eun-Ji
(고려대학교 컴퓨터정보학과)
Lee, Sung-Ju (고려대학교 컴퓨터정보학과) Chung, Yong-Wha (고려대학교 컴퓨터정보학과) Lee, Myung-Ho (명지대학교 컴퓨터소프트웨어학과) Min, Byoung-Ki ((주)아스텔 부설연구소) |
1 | K. Ishizaki, H. Komatsu, and T. Nakatani, "A Loop Transformation Algorithm for Communication Overlapping," Intl. J. of Parallel Programming, vol.28, no.2, pp.135-154, 2000. DOI ScienceOn |
2 | A. Danalis, et al., "Transformations to Parallel Codes for Communication-Computation Overlap," Proc. of SC, p.58, 2005. |
3 | T. Hoefler and A. Lumsdaine, "Optimizing Non- Blocking Collective Operations for Infiniband," Proc. of CAC, 2008. |
4 | B. Barney, POSIX Threads Programming, http:// www.llnl.gov/computing/tutorials/pthreads, 2006. |
5 | U. S. National Institute of Standards and Technology, "The Advanced Encryption Standard," Federal Information Processing Standard(FIPS) 197, 2002. |
6 | N. Dworkin, "Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality," NIST Special Publication 800-38C, 2002. |
7 | A. Samiah, A. Aziz, and N. Ikram, "An Efficient Software Implementation of AES-CCM for IEEE 802.11i Wireless Standard," Proc. of COMPSAC, pp.689-694, 2007. |
8 | C. Tseng, "Compiler Optimization for Eliminating Barrier Synchronization," Proc. of PPoPP, 1995. |
9 | J. Lipman and Q. Stout, "A Performance Analysis of Local Synchronization," Proc. of SPAA, 2006. |
10 | J. Hennessy and D. Patterson, Computer Architecture: A Quantitative Approach - Fourth Edition, Elsevier, 2007. |
11 | E. Lee, S. Lee, S. Hong, H. Choi, W. Choi, Y. Chung, B. Min, "Parallel Processing of AES-CCM," Proc. of the CISC 2009, vol.19, no.1, pp.199-202, 2009. (in Korean) |
12 | D. Bae, J. Kim, S. Park, and O. Song, "Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN," Proc. of CISC 2005, LNCS 3822, pp.346-357, 2005. |
13 | S. Akhter and J. Roberts, Multi-Core Programming - Increasing Performance through Software Multi-Threading, Intel Press, 2006. |
14 | D. Stinson, Cryptography: Theory and Practice, CRC Press, 2005. |
15 | A. Sohn, et al., "Identifying the Capability of Overlapping Computation with Communication," Proc. of PACT, p.133, 1996. |
16 | J. Black, "Authenticated Encryption," 2003. |
![]() |