2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC) 2015
DOI: 10.1109/iscisc.2015.7387896
|View full text |Cite
|
Sign up to set email alerts
|

A low-cost and flexible FPGA implementation for SPECK block Cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…5 with improvements. The different lightweight block ciphers include Tiny XTEA [9], LED [10], SPECK [12,13], SIMON [13], Hummingbird [11], are implemented on low-end Spartan-3 FPGA devices. The proposed work is compared with existing light-weight block ciphers with improved throughput (Mbps) and efficiency (kbps/slice) in the greater margin.…”
Section: Results and Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…5 with improvements. The different lightweight block ciphers include Tiny XTEA [9], LED [10], SPECK [12,13], SIMON [13], Hummingbird [11], are implemented on low-end Spartan-3 FPGA devices. The proposed work is compared with existing light-weight block ciphers with improved throughput (Mbps) and efficiency (kbps/slice) in the greater margin.…”
Section: Results and Analysismentioning
confidence: 99%
“…Furthermore, the FPGA provides features by using a unique identifier, Physically Unclonable Function (PUF), program and JTAG intercepts, key clear and device precise, Voltage and temperature monitors along with bit-stream scrubbing [8]. In addition, there are many security algorithms available for securing the IoT data includes Tiny XTEA [9], light encryption device (LED) [10], Hummingbird Algorithm (HB) [11], SPECK Block cipher [12], SIMON cipher [13], AES, DES, Triple DES [14], SIoT [15] and many more. However, in these, only lightweight ciphers are considered for IoT device security.…”
Section: Introductionmentioning
confidence: 99%
“…An FPGA-based hardware architecture was proposed in [70], for only one SPECK configuration, i.e., for 128/128 configuration. Experiments were performed on Xilinx Spartan-3 platform.…”
Section: Analysis On Existing Work On Fpga-based Hardware Architementioning
confidence: 99%
“…In recent years, several FPGA‐based implementations of the SIMON and SPECK algorithms have been reported in the literature . For example, in Chen et al, a bit‐serialized implementation of SPECK to achieve minimal area for low‐cost embedded applications was proposed.…”
Section: Introductionmentioning
confidence: 99%
“…For example, in Chen et al, a bit‐serialized implementation of SPECK to achieve minimal area for low‐cost embedded applications was proposed. In Nemati et al, two methods are used for the implementation of SPECK cipher. The first method is based on high‐level synthesis to give more flexibility and to achieve suitable throughput.…”
Section: Introductionmentioning
confidence: 99%