2011 17th International Conference on Digital Signal Processing (DSP) 2011
DOI: 10.1109/icdsp.2011.6004926
|View full text |Cite
|
Sign up to set email alerts
|

An FPGA implementation and performance evaluation of the seed block cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…It is obvious that the architectures in [20, 21] are better, in some areas than the proposed one, but their design philosophy is very different than ours (they are architectures for high‐speed applications). In [22], an architecture of Present cipher is presented for encryption‐only operation and its hardware implementation.…”
Section: Fpga Implementation and Resultsmentioning
confidence: 95%
See 2 more Smart Citations
“…It is obvious that the architectures in [20, 21] are better, in some areas than the proposed one, but their design philosophy is very different than ours (they are architectures for high‐speed applications). In [22], an architecture of Present cipher is presented for encryption‐only operation and its hardware implementation.…”
Section: Fpga Implementation and Resultsmentioning
confidence: 95%
“…So, reliable comparisons in term of the covered area between the proposed architecture and the other previously published architectures are impossible. Table 4 gives comparisons with previously published architectures for SEED cipher [7,8], [20,21] and for Present cipher [22][23][24]. Present is part of the ISO/IEC 29192-2:2012 standard [25] that specifies lightweight block ciphers suitable for IoT.…”
Section: Fpga Implementation and Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Chaotic functions are of important classes of random sequence generation for stream cipher system [9][10]. Some of the stream cipher algorithms based on chaotic systems and their implementations are discussed in [11][12][13][14][15].…”
Section: Introductionmentioning
confidence: 99%
“…As a device for realizing multiuser and massive data cryptographic services, the high-performance cryptographic server must achieve the following two points: First is the correctness of user services: the processing request of different users cannot be confused, and the second is the rapidity of data processing. ere are many researches on the fast implementation of the cryptographic algorithm itself, such as improving the computing performance of block cipher algorithm through pipelining [9][10][11][12][13] and optimizing the key operations of public-key cryptography algorithm to improve the operation speed [14][15][16]. Some studies also accelerate the performance of cryptographic operations through multicore parallelism.…”
Section: Related Researchmentioning
confidence: 99%