2011
DOI: 10.1109/jssc.2011.2108131
|View full text |Cite
|
Sign up to set email alerts
|

53 Gbps Native ${\rm GF}(2 ^{4}) ^{2}$ Composite-Field AES-Encrypt/Decrypt Accelerator for Content-Protection in 45 nm High-Performance Microprocessors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
55
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 112 publications
(55 citation statements)
references
References 10 publications
0
55
0
Order By: Relevance
“…In the following, the selection of the AES architecture organization and the S-BOX implementation are discussed Area-efficient AES implementations typically adopt folded datapath to reduce the gate count [18]- [21], as opposed to very high-performance targets with higher area cost by an order of magnitude [17]. In area-efficient designs, area tends to be dominated by memory, as shown by the area breakdown in Table I.…”
Section: Design Considerations For Energy-and Area-efficient Aes Corementioning
confidence: 99%
See 1 more Smart Citation
“…In the following, the selection of the AES architecture organization and the S-BOX implementation are discussed Area-efficient AES implementations typically adopt folded datapath to reduce the gate count [18]- [21], as opposed to very high-performance targets with higher area cost by an order of magnitude [17]. In area-efficient designs, area tends to be dominated by memory, as shown by the area breakdown in Table I.…”
Section: Design Considerations For Energy-and Area-efficient Aes Corementioning
confidence: 99%
“…1, which summarizes the throughput-energy features of previously published AES prototypes. Previous work focuses either on high throughput [16], [17] or very low-cost designs [18]- [20]. Compared with low-cost designs, the energy/bit of the high-throughput designs can be significantly smaller (down to pico-Joules per bit or even lower) at the cost of larger area penalties.…”
mentioning
confidence: 99%
“…The most efficient one is proposed by Mathew et al [13]. But, their design focused on ASIC platform which cannot directly be ported to FPGA platform.…”
Section: Algorithm 1 Xts Aes Encryption Proceduresmentioning
confidence: 99%
“…The S-box circuit is obtained from its truth table synthesis or generation rule when logic-based method is adopted. Although fewer resources are occupied by using two-level logic such as SOP, POS [4], PPRM [5] and BDD [6], or by employing logic circuit to achieve the calculation of the isomorphic fields of GF (2 8 ) (GF ((2 4 ) 2 ) [7] or GF (((2 2 ) 2 ) 2 ) [8]), the logic-base method provides little flexibility for different types of S-box operation. Furthermore, the accumulated resource of different S-box table synthesis should not be overlooked.…”
Section: Introductionmentioning
confidence: 99%