Our future work will include, modifying the filters 
in the compression function (using faster filters or 
filters that provide less losses) to decrease the 
execution time for the already implemented 
algorithms. Moreover, we intend to implement other 
voice encryption algorithms, with the purpose to 
provide a DSP platform that has security functions 
integrated and that can be used with trust to secure 
real-time sensitive communications. 
ACKNOWLEDGEMENTS 
This work has been funded by program Partnerships 
in priority areas – PN II carried out by MEN-
UEFISCDI, project No. 47/2014. 
REFERENCES 
Pedre, S., Krajnik, T., Todorovich, E., Borensztejn, P., 
2016.  Accelerating embedded image processing for 
real time: a case study. In Journal of Real-Time Image 
Processing, Vol. 11, No. 2, pp. 349-374. 
Joao, J. A., Mutlu, O., Patt, Y. N., 2009. Flexible 
Reference-Counting-Based Hardware Acceleration for 
Garbage Collection. In Proceedings of ISCA 2009, pp. 
1-11. 
Daemen J., Rijmen V., 2001. Rijndael: The Advanced 
Encryption Standard. In D r. Dobb's Journal, pp. 137-
139. 
Biryukov, A., Khovratovich, D., 2009. Related-key 
Cryptanalysis of the Full AES-192 and AES-256. In 
Cryptology ePrint Archive: Report 2009/317.  
Bogdanov, A., Khovratovich, D., Rechberger, C., 2011. 
Biclique Cryptanalysis of the Full AES. In Advances in 
Cryptology – ASIACRYPT 2011, Vol. 7073, pp. 344-
371. 
Rivest, R., Shamir, A., Adleman, L., 1978. A Method for 
Obtaining Digital Signatures and Public-Key 
Cryptosystems. In Communications of the ACM, Vol. 
21, No. 2, pp. 120-126. 
Rivest, L. R., Kaliski, B., 2003. RSA Problem. In 
Encyclopedia of Cryptography and Security, chapter 
RSA Problem. 
US Patent 6081597, 1996. Public key cryptosystem method 
and apparatus. In Google Patents. 
Sakshaug, H., 2007. Security Analysis of the NTRUEncrypt 
Public Key Encryption Scheme. Available at 
https://brage.bibsys.no/xmlui/bitstream/handle/11250/
258846/426901_FULLTEXT01.pdf (Last Accessed: 
October 2016).  
ADSP-BF537 Blackfin Processor Hardware Reference 
Manual, Revision 3.4, 2013. Available at http:// 
www.analog.com/media/en/dsp-documentation/ 
processor-manuals/ADSP-BF537_hwr_rev3.4.pdf 
(Last Accessed: October 2016). 
TMS320C6711, Floating-Point Digital Signal Procesors, 
2005. Available at http://www.ti.com/lit/ds/symlink 
/tms320c6711c.pdf (Last Accessed: October 2016). 
Wollinger, T., Guajardo, J., Paar, C., 2003. Cryptography 
in embedded systems: An overview. In Proceedings of 
the Embedded World 2003. 
Fiskiran, M., Lee, R.B., 2002. Workload characterization 
of elliptic curve cryptography and other network 
security algorithms for constrained environments. In 
Proceedings of the IEEE International Workshop on 
Workload Characterization (WWC-5), pp. 127-137. 
Wollinger, T., Wang, M., Guajardo, J., Paar, C., 2000. How 
well are high-end dsps suited for the aes algorithms? 
aes algorithms on the tms320c6x dsp. In AES Candidate 
Conference, pp. 94-105. 
Thulasimani, L., Madheswaran, M., 2010. 
Design And 
Implementation of Reconfigurable Rijndael Encryption 
algorithms for Reconfigurable Mobile Terminals. In 
International Journal on Computer Science and 
Engineering, Vol. 2, No. 4, pp. 1003-1011. 
Verna, H.K., Singh, R. K., 2012. Performance Analysis of 
RC6, Twofish and Rijndael Block Cipher Algorithms. In 
International Journal of Computer Applications, Vol. 
42, No. 16, pp. 1-7. 
Itoh, K., Takenaka, M., Torii, N., Temma, S., Kurihara, Y., 
1999. Fast implementation of public-key cryptography 
on a dsp tms320c6201. In CHES ’99: Proceedings of 
the First International Workshop on Cryptographic 
Hardware and Embedded Systems, pp. 61–72. 
Grobschadl, J., Tillich, S., Rechberger, C., Hofmann, M., 
Medwed, M., 2007. Energy evaluation of software 
implementations of block ciphers under memory 
constraints. In DATE, pp. 1110–1115. 
Yen, SM., Kim, S., Lim, S., Moon, S. J., 2003. RSA speedup 
with Chinese remainder theorem immune against 
hardware fault cryptanalysis. In IEEE Transactions on 
Computers, Vol. 52, No.4, pp. 461--472.  
Er, M. H., Wong, DJ., Sethu, A., Ngeow, KS., 1991. Design 
and implementation of RSA cryptosystem using multiple 
DSP chips. In IEEE International Symposium on 
Circuits and Systems, Vol. 1, pp. 49--52. 
Ambika, D., Radha, V., 2012. Secure Speech 
Communication- A Review. In International Journal of 
Engineering Research and Applications, Vol. 2, No. 5, 
pp. 1044-1049. 
Bassalee W., Kaeli D., 2008. Resource-Conscious 
Optimization of Cryptographic Algorithms on an 
Embedded Architecture. Available at http:// 
www.ece.neu.edu/groups/nucar/publications/ODSPES
08bassalee.pdf (Last Accessed: October 2016).