AXI Hardware Accelerator for McEliece on FPGA Embedded Systems

AXI Hardware Accelerator for McEliece on FPGA Embedded Systems

01Introduction This academic sharing is based on the research work published by Enrique Cantó-Navarro and Mariano López-García in IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING in 2025. Paper Title:AXI Hardware Accelerator for McEliece on FPGA Embedded Systems Authors:Enrique Cantó-Navarro, Mariano López-García Source:《IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING》,DOI:10.1109/TDSC.2024.3445181 Value Rating: Method Innovation ★★★★☆ Engineering Value … Read more

Performance Analysis of Data Encryption Algorithms – Part 1

Performance Analysis of Data Encryption Algorithms - Part 1

This article compares the performance of four commonly used encryption algorithms: DES, 3DES, Blowfish, and AES (Rijndael). By running several encryption settings to process data blocks of different sizes, the encryption/decryption speeds of the algorithms are evaluated and compared. The simulation is conducted using C#. Keywords: Encryption Algorithms, Performance, Analysis, AES, DES, Blowfish, TripleDES, Cryptography … Read more

Keccak-tiny: A Lightweight C++ Library

Keccak-tiny: A Lightweight C++ Library

Keccak-tiny: A Lightweight C++ Library Keccak-tiny is a C++ library based on the Keccak algorithm, known for its simplicity and efficiency. The Keccak algorithm is a powerful hashing algorithm widely used in the field of cryptography. Keccak-tiny provides an easy-to-use interface, allowing developers to easily implement secure data hashing in their projects. Next, let’s delve … Read more

Rust Cryptography Libraries: A Comprehensive Guide

Rust Cryptography Libraries: A Comprehensive Guide

Rust Cryptography Libraries: A Comprehensive Guide Cryptography refers to the process of converting information into a secure format, primarily achieved through encryption. It ensures that data transmitted over the network is secure and reliable. Although Rust has a random number generator, the most commonly used suite today is OpenSSL. As this guide shows, the Rust … Read more

Implementation Strategies for Secure Boot in Automotive Information Security

Implementation Strategies for Secure Boot in Automotive Information Security

Introduction Are you aware of the following: What is the significance of automotive information security? What is the main purpose of Secure Boot? What are the conventional implementation solutions for Secure Boot? In this article, we will explore and answer these questions together. For better understanding, here is the outline of the article: ▍Main Content … Read more

Understanding ONNX Runtime: Overview, Usage, and Source Code Analysis

Understanding ONNX Runtime: Overview, Usage, and Source Code Analysis

1. Overview The structure of onnx-runtime is as follows: Overall, this is a heterogeneous model execution framework that first performs hardware-independent graph optimization on the original ONNX model, retrieves the operator library corresponding to the currently supported hardware, then splits the model into multiple sub-models, and finally dispatches them to various hardware platforms for execution. … Read more

Explaining Encryption Algorithms to My Girlfriend Over the Weekend: Interested?

Explaining Encryption Algorithms to My Girlfriend Over the Weekend: Interested?

Recently, I worked on a project that involved selecting some encryption algorithms, and I would like to summarize them here to deepen our understanding of encryption. The most commonly used encryption algorithms can be summarized as one-way encryption and two-way encryption. They are quite simple and not difficult to understand. However, I believe it is … Read more

Step-by-Step: Implementing a Blockchain Client Based on RSA Algorithm Using Python

Step-by-Step: Implementing a Blockchain Client Based on RSA Algorithm Using Python

Big Data Digest Work Compiled by: Wan Jun, Molly, Jiang Bao Shang Blockchain, as the core technology behind Bitcoin and other cryptocurrencies, has attracted global attention in recent years. However, countries have varying attitudes towards this disruptive technology. Its decentralized distributed structure allows users to communicate directly without the need for a central node, which … Read more

Implementing Graphs with Adjacency Matrix and Adjacency List in C

Implementing Graphs with Adjacency Matrix and Adjacency List in C

Implementing Graphs with Adjacency Matrix and Adjacency List in C In data structures, a graph is a very important model that can represent various relationships, such as social networks, maps, and transportation networks. Graphs can mainly be represented in two ways: the adjacency matrix and the adjacency list. This article will detail these two representation … Read more

Unveiling the AES Algorithm: A Symmetric Encryption Tool for Data Security

Unveiling the AES Algorithm: A Symmetric Encryption Tool for Data Security

In the field of information security, cryptography plays a crucial role by encoding and decoding information to ensure its confidentiality, integrity, and authenticity. Symmetric encryption is a major branch of cryptography, characterized by the use of the same key for both encryption and decryption. Among the many symmetric encryption algorithms, the Advanced Encryption Standard (AES) … Read more