2013 IEEE 20th International Conference on Electronics, Circuits, and Systems (ICECS) 2013
DOI: 10.1109/icecs.2013.6815431
|View full text |Cite
|
Sign up to set email alerts
|

FPGA implementation of AES-based crypto processor

Abstract: Increased demand for data security is an undeniable fact. Towards achieving higher security, cryptographic algorithms play an important role in the protection of data from unapproved usage. In this paper, we present a crypto processor using Advanced Encryption Standard (AES). The AES is integrated with a 32-bit general purpose 5-stage pipelined MIPS processor. The integrated AES module is a fully pipelined module which follows inner round and outer round pipeline design. The results show that the presented pip… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…In all our reported results, we employ well-known Eqs. (26) and (27) to calculate the throughput and the throughput to area ratio respectively. For proposed ComI-SpeM, RomI-SpeM, and Com-Mux the number of outputted bits in Eq.…”
Section: Results and Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…In all our reported results, we employ well-known Eqs. (26) and (27) to calculate the throughput and the throughput to area ratio respectively. For proposed ComI-SpeM, RomI-SpeM, and Com-Mux the number of outputted bits in Eq.…”
Section: Results and Comparisonmentioning
confidence: 99%
“…Moreover, an efficient inter-round and intra-round pipeline design are employed to achieve high throughput. Authors presented a fully pipelined crypto processor in [26] where AES is integrated with a 32-bit general purpose 5-stage pipelined MIPS processor. In [40], authors designed a new VLSI 13 architecture to embed a four stage pipelined S-box in implementation of AES.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, parallel pipelined architecture achieved a high-speed design with efficient hardware implementation [18]. A 4-stage pipelined S-box and 32-bits general purpose 5-stage pipelined processor are presented advanced Very Large-Scale Integration (VLSI) architectures [19], [20].…”
Section: A Related Workmentioning
confidence: 99%
“…These keys will improve the security levels of data. The normal key's are basically extra persuading and speedier than uneven [2][3][4][5].…”
Section: Fig1: Aes Input/output Parametersmentioning
confidence: 99%