2019 11th International Conference on Knowledge and Smart Technology (KST) 2019
DOI: 10.1109/kst.2019.8687545
|View full text |Cite
|
Sign up to set email alerts
|

A Further Optimized Mix Column Architecture Design for the Advanced Encryption Standard

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…AES cryptosystem can be used effectively to protect sensitive data, while it is at rest, or during transmis-sion between different entities. Several approaches have been developed to enhance the efficiency of AES cryptosystems as in (Oukili and Bri, 2017, Rao Rupanagudi et al, 2019, Langenberg et al, 2020. AES cryptosystems have been applied in various domains, such as healthcare and smart grids, to ensure the confidentiality of sensitive data.…”
Section: Literature Reviewmentioning
confidence: 99%
“…AES cryptosystem can be used effectively to protect sensitive data, while it is at rest, or during transmis-sion between different entities. Several approaches have been developed to enhance the efficiency of AES cryptosystems as in (Oukili and Bri, 2017, Rao Rupanagudi et al, 2019, Langenberg et al, 2020. AES cryptosystems have been applied in various domains, such as healthcare and smart grids, to ensure the confidentiality of sensitive data.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Researchers have also worked on AES in terms of performance and security, both in hardware and software. Tillich and Herbst [35], Rupanagudi et al [36], Moh'd [37], Talha [38], and Shreedhar et al [39] proposed a method for improving the performance of AES in hardware in terms of area and clock speed. Intel's corporation proposed new AES instruction set for improving its performance and security for their processors [40].…”
Section: Introductionmentioning
confidence: 99%
“…et al,2013) and implemented a Vedic Mathematics multiplier on FPGA. Since then, several authors have been implementing Vedic Mathematics based multipliers in several applications related to the fields of communication, cryptography and DSPs (S. R. Rupanagudi et al,2014;S. Rao Rupanagudi et al, 2019).…”
Section: Introductionmentioning
confidence: 99%