2010
DOI: 10.1109/les.2010.2052401
|View full text |Cite
|
Sign up to set email alerts
|

High-Speed AES Encryptor With Efficient Merging Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 58 publications
(16 citation statements)
references
References 5 publications
0
16
0
Order By: Relevance
“…When compared with 8-bit architectures in terms of maximum frequency, only [21] (when optimized for speed) has a greater maximum frequency than both our implementations, which can be attributed to the differences in design. Furthermore, when compared to 128-bit architectures, [9], [10] and [18] have a higher maximum frequency owing to the fact that [9], [10] and [18] employ an optimized unrolled architecture, multi-staged pipeline architecture and modified architectures of ByteSubstitution and MixColumn operation respectively.…”
Section: Results and Comparisonsmentioning
confidence: 99%
See 1 more Smart Citation
“…When compared with 8-bit architectures in terms of maximum frequency, only [21] (when optimized for speed) has a greater maximum frequency than both our implementations, which can be attributed to the differences in design. Furthermore, when compared to 128-bit architectures, [9], [10] and [18] have a higher maximum frequency owing to the fact that [9], [10] and [18] employ an optimized unrolled architecture, multi-staged pipeline architecture and modified architectures of ByteSubstitution and MixColumn operation respectively.…”
Section: Results and Comparisonsmentioning
confidence: 99%
“…ByteSubstitution Unit 20.5% (main method))) by mapping the masking values of SBox and MixColumns, along with all intermediate operations, from GF (2 8 ) to (2 4 ) and achieves a high throughput of 40.9 Gbits/s. Unlike most architectures, Hammad et al achieves a 37% improvement in throughput by utilizing a new efficient architecture for AES encryptor by employing an Integrated Box (I-Box) and composite field arithmetic approach [10]. Jing et al [13] modifies MixColumns by proposing three different polynomials for the operation, which results in increase in variety of AES algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…The RotWord function performs a cyclic permutation on input word gives cyclic right shifted 4 bytes output word. Rcon is array of bytes in a word having fixed logical value having size of 128 bit [2]. A 128 bit Key register is fixed signal used to temporal storage of cipher key computed for each round of operation.…”
Section: Key Expansionmentioning
confidence: 99%
“…In cryptography, AES is called as Rijndael Encryption algorithm that is capable of protecting sensitive information. [1][2][3][4] 2. AES FRAME WORK Table 1 shows the structure of Rijndael Algorithm adopted by AES. AES uses the data block of 128 bits and Cipher key of 128, 192 or 256.…”
Section: Introductionmentioning
confidence: 99%