Cryptographic Engineering 2009
DOI: 10.1007/978-0-387-71817-0_10
|View full text |Cite
|
Sign up to set email alerts
|

FPGA and ASIC Implementations of AES

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0
3

Year Published

2010
2010
2021
2021

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 51 publications
(32 citation statements)
references
References 18 publications
0
29
0
3
Order By: Relevance
“…Table 3 also shows the variants using Poly. From the results shown in Table 3 we can infer the following: The sequential decryption core in HMCH[BRW] was implemented using the techniques in [8]. In [8] the operations BS and MC are combined in a substitution operation which the authors call as T-boxes.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Table 3 also shows the variants using Poly. From the results shown in Table 3 we can infer the following: The sequential decryption core in HMCH[BRW] was implemented using the techniques in [8]. In [8] the operations BS and MC are combined in a substitution operation which the authors call as T-boxes.…”
Section: Resultsmentioning
confidence: 99%
“…From the results shown in Table 3 we can infer the following: The sequential decryption core in HMCH[BRW] was implemented using the techniques in [8]. In [8] the operations BS and MC are combined in a substitution operation which the authors call as T-boxes. In our implementation for the decryption core we used inverse T-boxes (iTbox) which combines the operations inverse byte substitution (iBS) and inverse mixcolumn (iMC).…”
Section: Resultsmentioning
confidence: 99%
“…The SubBytes and InvSubBytes steps are often considered as the most critical part of the AES, and several architectures for S RD and S −1 RD have already been described in the open literature (see for instance [12] for a comprehensive bibliography). On Xilinx Virtex-6 FPGAs, the best design strategy consists in implementing the AES S-boxes as 8-input tables [10].…”
Section: Arithmetic and Logic Unitmentioning
confidence: 99%
“…is a multiplication modulo the irreducible polynomial m(x)= x 8 +x 4 +x 3 +x+1 [11]. More information about AES algorithm is in [1,10].…”
Section: Columns Functionmentioning
confidence: 99%