2013 23rd International Conference on Field Programmable Logic and Applications 2013
DOI: 10.1109/fpl.2013.6645572
|View full text |Cite
|
Sign up to set email alerts
|

Compact implementation of CCM and GCM modes of AES using DSP blocks

Abstract: In this manuscript, we have explored how the use of DSP blocks in the implementation of two authenticated-encryption modes of AES can optimize the PAR figures. Our results reflect that a 20.98 % reduction in slice utilization can be achieved at a throughput higher than 25 Mbps (12 MHz) in the Artix-7 XC7A200TL FPGA.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…de la Piedra et al built a low-area design using 28 DSP slices, and only 159 logic slices and 15 block RAM. However, their design has a much lower throughput than DRAB-LOCUS with only 124 Mbps [2]. This is an example of a design with low resource usage that produces low throughput.…”
Section: Discussionmentioning
confidence: 99%
“…de la Piedra et al built a low-area design using 28 DSP slices, and only 159 logic slices and 15 block RAM. However, their design has a much lower throughput than DRAB-LOCUS with only 124 Mbps [2]. This is an example of a design with low resource usage that produces low throughput.…”
Section: Discussionmentioning
confidence: 99%
“…It is currently implemented in many hardware security modules (HSMs) that are parts of many automotive micro-controller units (MCUs). Many papers have optimized implementations of GCM, increasing its throughput and the speed of its internal operations in application-specific integrated circuit (ASIC)-based architectures [19][20][21][22][23] or field programmable gate array (FPGA)-based architectures [24][25][26][27][28][29][30][31]. GCM is also used in network-based systems to secure communication [32][33][34][35][36][37].…”
Section: The Gcm Hashing Algorithmmentioning
confidence: 99%