2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512)
DOI: 10.1109/iscas.2004.1329329
|View full text |Cite
|
Sign up to set email alerts
|

Design of a reconfigurable AES encryption/decryption engine for mobile terminals

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(12 citation statements)
references
References 5 publications
0
12
0
Order By: Relevance
“…Pionteck et al [69] present a dynamically reconfigurable function-unit for error detection and correction in mobile terminals. The same authors have presented a reconfigurable encryption engine for mobile terminals [68]. Creates a basic frame by copying data from a source location to the packetmemory, and appends a header to it.…”
Section: Sequence Of Functionsmentioning
confidence: 99%
See 3 more Smart Citations
“…Pionteck et al [69] present a dynamically reconfigurable function-unit for error detection and correction in mobile terminals. The same authors have presented a reconfigurable encryption engine for mobile terminals [68]. Creates a basic frame by copying data from a source location to the packetmemory, and appends a header to it.…”
Section: Sequence Of Functionsmentioning
confidence: 99%
“…The similarity of different algorithms may be used to incorporate units (inside this RFU or as a separate RFU) that best exploit this similarity. As an example, Logger et al [51] propose a reconfigurable encryption unit that can implement three different encryption algorithms; RC4, DES and 3DES, while Pionteck et al [68] [69,70].…”
Section: Crypto-rfumentioning
confidence: 99%
See 2 more Smart Citations
“…In general, stream ciphers have lower complexity and higher throughput than block ciphers. Due to these attractive properties, stream ciphers are widely used in embedded/mobile applications such GSM telephony (the A5 family of stream ciphers [3]), the 802. 11 Wireless Encryption Protocol (WEP) [4] and Secure Sockets Layer (SSL) [5]-both use the RC4 stream cipher and the Bluetooth protocol (E0 stream cipher) [6].…”
Section: Introductionmentioning
confidence: 99%