Bummer! This is just a preview. You need to be signed in with an account to view the entire instruction.
Well done!
You have completed (UPI) Chapter 16: Emerging Technologies in Cybersecurity!
Instruction
16.5.2 Evaluation of the Effective Key Throughput
<style> sub { vertical-align: sub; font-size: 70%; } sup { vertical-align: super; font-size: 70%; } </style>
In this section, we evaluate the effective (peak) key throughput. Figure 10 plots the median of each RBC cryptosystem's effective key throughput on a logarithmic scale. The AES256 implementation, aided by AES-NI, ran several orders of magnitude more efficientl...