2017
DOI: 10.1016/j.jksuci.2016.01.004
|View full text |Cite
|
Sign up to set email alerts
|

Comparative analysis of different AES implementation techniques for efficient resource usage and better performance of an FPGA

Abstract: International audienceOver the past few years, cryptographic algorithms have become increasingly important. Advanced Encryption Standard (AES) algorithm was introduced in early 2000. It is widely adopted because of its easy implementation and robust security. In this work, AES is implemented on FPGA using five different techniques. These techniques are based on optimized implementation of AES on FPGA by making efficient resource usage of the target device. Experimental results obtained are quite varying in nat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
46
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 55 publications
(47 citation statements)
references
References 12 publications
0
46
1
Order By: Relevance
“…In this work, we consider the reference model shown in Fig. 1 and propose to use five different implementations [22] of AES algorithm. These techniques use different hardware implementation optimizations.…”
Section: Reference Iot Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…In this work, we consider the reference model shown in Fig. 1 and propose to use five different implementations [22] of AES algorithm. These techniques use different hardware implementation optimizations.…”
Section: Reference Iot Modelmentioning
confidence: 99%
“…This is because of the optimized design process and miniaturized processing technologies. Moreover, the efficient implementations of AES [22,23] have made it a suitable candidate that can offer a solution to the security challenges of IoT-based systems. In this regard, authors in [24] have presented an efficient implementation of AES for IoT devices.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Lee et al [19] have proposed heterogeneous twofold preparing portion (twofold PE) format and a need dealt with booking of sensible to-left twofold and-circuit reliably EC scalar multiplication (ECSM) with randomized controlling technique. The equipment execution is capable paying little character to the way that the ECC plots are secure at cryptanalysis, the private educational assembling constantly in an unprotected gadget contraption will be removed by physical strikes.…”
Section: Related Workmentioning
confidence: 99%
“…This paper focuses on the development of a modified AES for file cryptographic transformation based on reduced-round with revised round keys and key schedule to secure confidential files that are either stored locally or to be sent through a network to prevent an unwanted third party from reading the confidential information [16][17][18]. The revised cipher round and key schedule of the modified AES aim to provide a better avalanche effect in the first three rounds and randomness of the ciphertext results [19] while the reduced round compensates the execution time due to the addition of operations in both the cipher round and key schedule algorithm.…”
Section: Introductionmentioning
confidence: 99%