2015 International Conference on Pervasive Computing (ICPC) 2015
DOI: 10.1109/pervasive.2015.7087187
|View full text |Cite
|
Sign up to set email alerts
|

A review: Hardware Implementation of AES using minimal resources on FPGA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…To tackle these issues, some IoT devices already provide hardware-based loosely coupled implementations of some security algorithms [27][28][29]. Nonetheless, the performance gains come at the cost of extra hardware added to the device.…”
Section: Aes Acceleratorsmentioning
confidence: 99%
“…To tackle these issues, some IoT devices already provide hardware-based loosely coupled implementations of some security algorithms [27][28][29]. Nonetheless, the performance gains come at the cost of extra hardware added to the device.…”
Section: Aes Acceleratorsmentioning
confidence: 99%
“…The circuit is described in a hardware description language, typically Verilog or VHDL [10], and it is synthesized and implemented on the target device through automated design tools. Typically, the FPGA fabric is composed from a large set of logic resources, such as lookup tables (LUT) [11], flip-flops (FF), input-output blocks (IOBs) and others, that are interconnected through configurable routing resources. The available hardware resources allow the implementation of highly parallel circuits for multiple controllers that can greatly accelerate computations on FPGAs compared to a microcontroller or DSP.…”
Section: Introductionmentioning
confidence: 99%
“…SCA is one of attack models that utilizes side informations to obtain the secret key. A cryptographic device is a device that implements cryptographic algorithms on a hardware [6][7][8]. Power analysis is a type of SCA attacks that can reveal confidential information [9].…”
Section: Introductionmentioning
confidence: 99%