2012
DOI: 10.11591/ijres.v1i2.551
|View full text |Cite
|
Sign up to set email alerts
|

AES Encryption Algorithm Hardware Implementation: Throughput and Area Comparison of 128, 192 and 256-bits Key

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…AES algorithm can be implemented using different methods and contributions which can be categorized as follows. In the first one, loop unrolling and iterative techniques are used to increase throughput to area ratio and decrease area cost [12,13]. The second category includes the designs which use pipelining and full-pipelining techniques to increase operational frequency and throughput [6], [14].…”
Section: Previous Workmentioning
confidence: 99%
“…AES algorithm can be implemented using different methods and contributions which can be categorized as follows. In the first one, loop unrolling and iterative techniques are used to increase throughput to area ratio and decrease area cost [12,13]. The second category includes the designs which use pipelining and full-pipelining techniques to increase operational frequency and throughput [6], [14].…”
Section: Previous Workmentioning
confidence: 99%
“…Advanced Encryption Standard (AES) is one of most frequently used symmetric algorithms because of its combination of security, performance both in hardware and software, efficiency, and flexibility [3]. AES was established by National Institute of Standards and Technology (NIST) to replace DES [4] and 3DES and with a key length of 128, 192, and 256 bits. It takes a 128-bit data length and considers it as an array of bytes, and takes it as a 4x4 matrix called states.…”
Section: Introductionmentioning
confidence: 99%
“…Indeed, described in RFC3711 (reference document), the SRTP protocol is the security solution of the transport protocol of the voice data which is the most used in practice. So, the SRTP uses the AES (Advanced Encryption Standard) algorithm ( [6], [9], [13], [16], [18], [24]) for encryption; the HMAC-SHA-1 (Hash message authentication code -Secure Hash Algorithm 1) algorithm [26] for authentication and the Diffie Hellman (DH) protocol for key exchange [2]. However, this protocol still has several shortcomings, in particular: the key exchange problem imposed by AES, the non-repudiation service which is not well-guaranteed due to the certification system which isn't used, and in addition, this protocol is not suitable for multi-point communications [28].…”
Section: Introductionmentioning
confidence: 99%