2003
DOI: 10.1007/3-540-36400-5_13
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Software Implementation of AES on 32-Bit Platforms

Abstract: Abstract.Rijndael is the winner algorithm of the AES contest; therefore it should become the most used symmetric-key cryptographic algorithm. One important application of this new standard is cryptography on smart cards. In this paper we present an optimisation of the Rijndael algorithm to speed up execution on 32-bits processors with memory constraints, such as those used in smart cards. First a theoretical analysis of the Rijndael algorithm and of the proposed optimisation is discussed, and then simulation r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
46
0
1

Year Published

2005
2005
2011
2011

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 89 publications
(47 citation statements)
references
References 7 publications
0
46
0
1
Order By: Relevance
“…We had the least available information on Bertoni's idea, according to [1] probably for Bertoni's work had been under patenting process. We therefore gave up making any attempts to optimize implementation based on his idea.…”
Section: Measurement Results-standard-defi Ned Aes Algorithmmentioning
confidence: 99%
See 2 more Smart Citations
“…We had the least available information on Bertoni's idea, according to [1] probably for Bertoni's work had been under patenting process. We therefore gave up making any attempts to optimize implementation based on his idea.…”
Section: Measurement Results-standard-defi Ned Aes Algorithmmentioning
confidence: 99%
“…This approach uses only three smaller tablesSBox, inverse SBox and RCon, therefore consumes signifi cantly less memory [1], but uses multiplication more intensively.…”
Section: Implementation Detailsmentioning
confidence: 99%
See 1 more Smart Citation
“…The only difference is that the sub-key rounds are applied in reverse order for decryption. 7 Each one of the above described transformations BS, SR, MC, and ARK are invertible [28]. Let us call them IBS, ISR, IMC, and IARK, respectively.…”
Section: A4 Add Round Key (Ark) Stepmentioning
confidence: 99%
“…For example, AES software implementations [7,19] have a throughput that ranges from 300 to 800 Mbps depending on the specific architecture and platform selected by the developers. Some efficient encryptor/decryptor core VLSI implementations have also been reported in [27,36,51].…”
Section: Introductionmentioning
confidence: 99%