2016
DOI: 10.17485/ijst/2016/v9i38/90314
|View full text |Cite
|
Sign up to set email alerts
|

FPGA Implementation and Analysis of the Block Cipher Mode Architectures for the PRESENT Light Weight Encryption Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…Similarly, smartphones exhibit their versatility being used as gateway [267][268][269], user interface [270,271], and sensing [265,266] IoT devices. Meanwhile, FPGAs have exhibited a sigmoid exponential phase growth in the last two years, with applications such as data encryption [273][274][275], routing algorithms optimization [276], and parallel networks simulation [277].…”
Section: Discussionmentioning
confidence: 99%
“…Similarly, smartphones exhibit their versatility being used as gateway [267][268][269], user interface [270,271], and sensing [265,266] IoT devices. Meanwhile, FPGAs have exhibited a sigmoid exponential phase growth in the last two years, with applications such as data encryption [273][274][275], routing algorithms optimization [276], and parallel networks simulation [277].…”
Section: Discussionmentioning
confidence: 99%
“…Compared to our AES design, PRESENT-CBC reduces area occupation by 79.27% and 41.14% in terms of power dissipation, as shown in Figures 13 and 14. In addition, our encryption design has better area implementation than the design in [35]. However, as can be seen in Figure 15, the proposed HMAC-PHOTON decreased by 50.34% in area and 75.28% in power usage compared to HMAC-SHA256.…”
Section: Throughput =mentioning
confidence: 86%
“…Deploying the parallelizable structure, the implemented area increases linearly with the input block. In addition, among the recommended mode of operations in [5], CBC shows a competitive implementation result [35].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The select f req function uses AES CTR mode (AES is al- ready present in LoRaWAN stack, so using the same will result into light weight solution) to generate a pseudorandom channel from the available spectrum because of its important random access property. The cost perspective of using this cryptographic function (AES CTR) is very low [50], since AES and record of utilized channel is already part of LoRaWAN stack. The CCH, algorithm for channel selection works as follows:…”
Section: Cchmentioning
confidence: 99%