2023
DOI: 10.1007/978-981-19-6383-4_4
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Performance Analysis of Different Architectures of AES Algorithm on FPGA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…It is typically measured in operations per second and represents the amount of data that can be processed by the circuit in a given time period; is calculated using Eq. (11). A higher throughput means that the circuit can process more data in a given amount of time, which can also lead to a better performance.…”
Section: Max Frequencymentioning
confidence: 99%
See 1 more Smart Citation
“…It is typically measured in operations per second and represents the amount of data that can be processed by the circuit in a given time period; is calculated using Eq. (11). A higher throughput means that the circuit can process more data in a given amount of time, which can also lead to a better performance.…”
Section: Max Frequencymentioning
confidence: 99%
“…Moreover, chaos-based cryptography offers a promising solution as a replacement for traditional symmetric cryptographic methods, such as the advanced encryption system (AES) 11 . Chaos-based systems boast numerous benefits, including high sensitivity to initial conditions, ergodicity, deterministic random number generation, complex structures, a vast key-space, adaptability, and a large periodicity.…”
Section: Introductionmentioning
confidence: 99%
“…An example of a cyclic group is shown in each of the Figure 6a-c. These groups were generated by an elliptic curve with the order 19 and the generator points (10,11), (7,6), and (16,4), respectively. Each of these figures is shown in its own separate figure.…”
Section: Periodicity Analysis Of Elliptic Curve Cryptographic Fsmmentioning
confidence: 99%
“…The use of the Modified Cryptographic Turbo Code Finite State Machine (MCTC-FSM) is expanding into new domains, such as privacy protection [7], encrypted image authentication, and authorship verification. One major drawback of current methods is that the encoded information can only be accessed either before or after the image has been decoded.…”
Section: Introductionmentioning
confidence: 99%