2018 International Conference on Advanced Technologies for Communications (ATC) 2018
DOI: 10.1109/atc.2018.8587500
|View full text |Cite
|
Sign up to set email alerts
|

An Energy Efficient AES Encryption Core for Hardware Security Implementation in IoT Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 3 publications
0
11
0
Order By: Relevance
“…The first four bits of the element represent the number of the row of the S-Box while the second four bits represent the number of the column of the S-Box. The value obtained from the S-Box due to the number of the row and the number of the column will replace the previous value of the element [22]. The SubBytes step is shown in Figure 2.…”
Section: The Subbytes Stepmentioning
confidence: 99%
“…The first four bits of the element represent the number of the row of the S-Box while the second four bits represent the number of the column of the S-Box. The value obtained from the S-Box due to the number of the row and the number of the column will replace the previous value of the element [22]. The SubBytes step is shown in Figure 2.…”
Section: The Subbytes Stepmentioning
confidence: 99%
“…In the initial round, the text is Xored with the input key to produce the input of the next round while the second round starts with the subbytes steps [5,23,24].…”
Section: Fig 1 the Aes Encryption Systems Steps Of Each Roundmentioning
confidence: 99%
“…The element of every row is shifted due to the number of the rows, the first row is not shifted, the second row is where one element is shifted to the left, the third row is where the two elements are shifted to the left and the final row is where the three elements are shifted to the left as shown in Fig. 4 [4,5,16,23].…”
Section: B the Shiftraws Stepmentioning
confidence: 99%
See 1 more Smart Citation
“…The block size of each algorithm is 128 bits, and the key length is one of these sizes: 128, 192 or 256 bits. The key length is a symmetric-key technique which utilizes the same key for encrypting and decrypting [6][7][8]. One of the main problems that faces the AES encryption system is the long time consumed to perform the encryption and the decryption processes.…”
Section: Introductionmentioning
confidence: 99%