2018
DOI: 10.1109/tdsc.2016.2620437
|View full text |Cite
|
Sign up to set email alerts
|

Architecture Design of an Area Efficient High Speed Crypto Processor for 4G LTE

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…N. B. Hulle, Prathiba B, Sarika R. Khope, K. Anuradha, Yogini Borole, D. Kotambkar, proposal Optimized for SNOW 3G(2021) [15,30], In this work to progress the showing of the SNOW 3G algorithm. By using the architecture novel Modulo CLA more than 232 to reduce the publishing delay in the Federated States of Micronesia, which makes the decision decisive the algorithm of delay [15,[31][32][33] These designs save 6 KB of memory as compared to existing designs. 6KB of memory is provided by Architecture-1 to s-box at the expense of extra hardware (two (4) I/p transmitters, one 2-bit counter, and four 32-bit latches).…”
Section: Snow3g Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…N. B. Hulle, Prathiba B, Sarika R. Khope, K. Anuradha, Yogini Borole, D. Kotambkar, proposal Optimized for SNOW 3G(2021) [15,30], In this work to progress the showing of the SNOW 3G algorithm. By using the architecture novel Modulo CLA more than 232 to reduce the publishing delay in the Federated States of Micronesia, which makes the decision decisive the algorithm of delay [15,[31][32][33] These designs save 6 KB of memory as compared to existing designs. 6KB of memory is provided by Architecture-1 to s-box at the expense of extra hardware (two (4) I/p transmitters, one 2-bit counter, and four 32-bit latches).…”
Section: Snow3g Algorithmmentioning
confidence: 99%
“…The "ZUC" cipher stream is used in the output algorithms (128 EEA3 and 128 EIA3), which is named after Zhou Zhongzhi, a famous Chinese historian. ZUC is a stream cipher that is word-oriented [33]. It takes a 128-bit primary key and a 128-bit primary vector as input and outputs a key flow of 32-bit words for usual (encryption and decryption), as shown in Figure (8).…”
Section: Zuc Algorithmmentioning
confidence: 99%
“…The total memory needed for the realization of two S-boxes is 8KB. Existing implementation [10][11][12][13][14][15][16][26][27][28][29] uses S-box architecture as shown in Figure 3. The four lookup tables of S1 i.e.…”
Section: Novel Modulo Cla Architecture Over 2 32mentioning
confidence: 99%