2017
DOI: 10.1007/978-3-319-66787-4_33
|View full text |Cite
|
Sign up to set email alerts
|

Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
80
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 43 publications
(80 citation statements)
references
References 25 publications
0
80
0
Order By: Relevance
“…To support both encryption and decryption operations, the unified architecture sharing common datapath for both encryption and decryption operations was proposed in [5]. However, the implementations may not be suitable for low-end devices, such as passive RFID tags, where the area and power consumption are limited [6,7]. In order to dramatically reduce the area and power consumption of the circuit, serial implementation is considered.…”
Section: Previous Work On Asicmentioning
confidence: 99%
See 3 more Smart Citations
“…To support both encryption and decryption operations, the unified architecture sharing common datapath for both encryption and decryption operations was proposed in [5]. However, the implementations may not be suitable for low-end devices, such as passive RFID tags, where the area and power consumption are limited [6,7]. In order to dramatically reduce the area and power consumption of the circuit, serial implementation is considered.…”
Section: Previous Work On Asicmentioning
confidence: 99%
“…e serial hardware operates in units of one bit or a few bits. is compact hardware is suitable for resource-constrained devices such as passive RFID tags with limited chip area and peak power consumption [7,15,17].…”
Section: Hardware Implementationmentioning
confidence: 99%
See 2 more Smart Citations
“…The clock consumption is considered one of the problems that face the information security experts. The more time the encryption system takes to encrypt the data, the more chances increase for the hackers to break into the system [17,18]. This paper discusses the design, analysis and implementation of pipelined method to reduce the consumed numbers of clocks and speed up the processes [19].…”
Section: Introductionmentioning
confidence: 99%