2021
DOI: 10.1109/access.2021.3100104
|View full text |Cite
|
Sign up to set email alerts
|

A Flexible Gimli Hardware Implementation in FPGA and Its Application to RFID Authentication Protocols

Abstract: Radio Frequency Identification (RFID) systems have bestowed numerous conveniences in a multitude of applications, but the underlying wireless communications architecture makes it vulnerable to several security threats. To mitigate these issues, various authentication protocols have been proposed. The literature accommodates comprehensive proposals and analysis of authentication protocols, but not many of them provide hardware implementations. In addition, there is diverse demand for hardware area and throughpu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 35 publications
0
6
0
Order By: Relevance
“…The SQR unit in Fig. 2 is implemented by putting a '0' bit after every successive data bit, as implemented in hardware accelerators of [11,13,19].…”
Section: Arithmetic and Logic Unit (Alu)mentioning
confidence: 99%
See 3 more Smart Citations
“…The SQR unit in Fig. 2 is implemented by putting a '0' bit after every successive data bit, as implemented in hardware accelerators of [11,13,19].…”
Section: Arithmetic and Logic Unit (Alu)mentioning
confidence: 99%
“…The polynomial multiplication computation specifies the performance of the PM architecture [2,11,[17][18][19]21,27,28,[30][31][32]. For multiplying two m-bit polynomial multiplications, several architectures have been presented in the literature [11,[17][18][19]21,27,28,30]. These includes (i) bit-serial, (ii) bit-parallel, (iii) digit-serial and (iv) digit-parallel approaches.…”
Section: Arithmetic and Logic Unit (Alu)mentioning
confidence: 99%
See 2 more Smart Citations
“…It analyzes the different attacks and communication costs, computational costs, and storage space costs using the AVISPA tool. The gimli-based hash and authentication encryption (AE) implementation for RFID devices is used in [18]. The chip area, frequency, latency, and throughput parameters on hardware is evaluated experimentally.…”
Section: Introductionmentioning
confidence: 99%