2016
DOI: 10.1109/tifs.2016.2576903
|View full text |Cite
|
Sign up to set email alerts
|

DW-AES: A Domain-Wall Nanowire-Based AES for High Throughput and Energy-Efficient Data Encryption in Non-Volatile Memory

Abstract: Big-data storage poses significant challenges to anonymization of sensitive information against data sniffing. Not only will the encryption bandwidth be limited by the I/O traffic, the transfer of data between processor and memory will also expose the input-output mapping of intermediate computations on I/O channels that are susceptible to semi-invasive and noninvasive attacks. Limited by the simplistic cell-level logic, existing logic-in-memory computing architectures are incapable of performing the complete … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 44 publications
(14 citation statements)
references
References 36 publications
0
14
0
Order By: Relevance
“…The study outcome was finally witnessed with lowered encryption time. Usage of AES was also seen in the work carried out by Wang et al [31] adopting nanowires. Different forms of memory-based array were deployed for this purpose using external interface of input-output.…”
Section: Researches Performed On Big Data Securitymentioning
confidence: 75%
“…The study outcome was finally witnessed with lowered encryption time. Usage of AES was also seen in the work carried out by Wang et al [31] adopting nanowires. Different forms of memory-based array were deployed for this purpose using external interface of input-output.…”
Section: Researches Performed On Big Data Securitymentioning
confidence: 75%
“…Authentication entities are disks, not individual files. KEY-SSD Encryption [30,34,37,9,42,47,20,39,50,49,43] is a popular technique for protecting data stored in disk drives. The entire disk can be encrypted (full-disk encryption), or files are encrypted selectively.…”
Section: Related Workmentioning
confidence: 99%
“…Some recent research works start to explore and evaluate the performance of this concept. It has been applied both on volatile memories [7] [8] [9] and non volatile memories [10] [11].…”
Section: Related Work a In-memory Computingmentioning
confidence: 99%