@inproceedings{6a5ac2ddbe0749c19f651b82211f39a5,
title = "On permutation operations in cipher design",
abstract = "New and emerging applications can change the mix of operations commonly used within computer architectures. It is sometimes surprising when instruction-set architecture (ISA) innovations intended for one purpose are used for other (initially unintended) purposes. This paper considers recent proposals for the processor support of families of bit-level permutations. From a processor architecture point of view, the ability to support very fast bit-level permutations may be viewed as a further validation of the basic word-orientation of processors, and their ability to support next-generation secure multimedia processing. However, bitwise permutations are also fundamental operations in many cryptographic primitives and we discuss the suitability of these new operations for cryptographic purposes.",
author = "Lee, {Ruby B.} and Shi, {Z. J.} and Yin, {Y. L.} and Rivest, {Ronald L.} and Robshaw, {M. J.B.}",
note = "Copyright: Copyright 2010 Elsevier B.V., All rights reserved.; International Conference on Information Technology: Coding Computing, ITCC 2004 ; Conference date: 05-04-2004 Through 07-04-2004",
year = "2004",
doi = "10.1109/ITCC.2004.1286714",
language = "English (US)",
isbn = "0769521088",
series = "International Conference on Information Technology: Coding Computing, ITCC",
pages = "569--577",
editor = "P.K. Srimani and A. Abraham and M. Cannataro and J. Domingo-Ferrer and R. Hashemi",
booktitle = "International Conference on Information Technology",
}