2012 Second International Conference on Digital Information and Communication Technology and It's Applications (DICTAP) 2012
DOI: 10.1109/dictap.2012.6215353
|View full text |Cite
|
Sign up to set email alerts
|

FPGA based pipelined architecture for RC5 encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
4
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 11 publications
1
4
0
Order By: Relevance
“…179 MHz and area is reduced 50% in comparision with work done by different devices. [2] The work results are in confirmity with the trend comparision of results published by other workers in various devices.…”
Section: Resultssupporting
confidence: 90%
See 2 more Smart Citations
“…179 MHz and area is reduced 50% in comparision with work done by different devices. [2] The work results are in confirmity with the trend comparision of results published by other workers in various devices.…”
Section: Resultssupporting
confidence: 90%
“…The area-delay product has shown a reduction of nearly 50% when compared with the reference [2] of RC5 design. The simulation of the pipelined design is shown in the figure 8, which clearly illustrates the pipelining mechanism of the proposed model for 12 rounds and encrypted data is shown at output after every clock pulse after initial delay…”
Section: Implementation Resultsmentioning
confidence: 92%
See 1 more Smart Citation
“…The future scope of this work will be where priority of the data has a given more emphasis with sliding window. Ruhan Bevil et al (2012) again presented FPGA based pipelined architecture for RC5 that improves response time of the system with less resources using H/CDFG technique [5]. H/CDFG is made of combination of different CDFG's and DFG's which describes the data flow and control transfer in the design, often used in many design approaches to reduce time to design .The proposed hardware implementation is more suitable for RC5 as it is achieve to response time and high throughput result will term on both of speed and security.…”
Section: Fig5: 2d-discrete Wavelet Transfrommentioning
confidence: 99%
“…[5] The drawback of this architecture is, since only one key is use the encrypt the data; it is easy to retrieve the intermediate result of any round through the pipeline. [1].…”
Section: Introductionmentioning
confidence: 99%