2016
DOI: 10.1016/j.micpro.2016.10.003
|View full text |Cite
|
Sign up to set email alerts
|

High-throughput low-area design of AES using constant binary matrix-vector multiplication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(15 citation statements)
references
References 2 publications
0
15
0
Order By: Relevance
“…Composite field and combinational logic strategy for s-box execution are compared within the foundation of area and throughput. To decrease the employed area, Lee et al [18] employed a sequence of continuous binary matrix multiplication rather of Galois field (GF) (28) calculation. Additionally, a four-step pipelined execution is also offered.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Composite field and combinational logic strategy for s-box execution are compared within the foundation of area and throughput. To decrease the employed area, Lee et al [18] employed a sequence of continuous binary matrix multiplication rather of Galois field (GF) (28) calculation. Additionally, a four-step pipelined execution is also offered.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The objective is accomplished in the perform by sub-pipelining each procedure by having registers at suitable positions. In some other scientific studies [14,[16][17][18], the sub-pipelining is transported out by just managing the pipelining not targeted at producing the initiation interval to Just one.…”
Section: Smentioning
confidence: 99%
“…Optimization for speed and area are done through pipelining, sub-pipelining, loop unrolling, reducing the logic depth etc. [14][15][16][17][18][19][20]. Balancing between pipelining stages were done through allocation of registers at proper locations in order to avoid stalling.…”
Section: Fig 1 Overall View Of Hardware Acceleration Processmentioning
confidence: 99%
“…The authors used loop unrolling for critical path modification and fully pipelined and sub-pipelined techniques, which allowed the increase in the clock frequency and reduction in critical path. To reduce the area, Lee et al [18] employed a series of constant binary matrix multiplication instead of Galois field (GF) (28) computation. Good and Benaissa [19] presented two designs for AES feedback mode support.…”
Section: Fig 1 Overall View Of Hardware Acceleration Processmentioning
confidence: 99%
“…Software implementations of the AES and PRESENT ciphers for low-cost smartphones have been compared in Andrés et al (2016) . Some of the popular complementary metal-oxide semiconductor (CMOS) application-specific integrated circuit (ASIC) implementations of the AES cipher on 180 nm technology include Dao et al (2016), Kuo and Verbauwhede (2001); Verbauwhede et al (2003), Kim et al (2003); Li (2006), Cao and Li (2009); Alma’Aitah and Abid (2010); Lee et al (2016), Van Lan et al (2018); and Cast (2019). AES as a coprocessor for embedded cryptographic and biometric applications has been designed and fabricated using TSMC 6 M 180 nm CMOS technology by Tiri et al (2005).…”
Section: Introductionmentioning
confidence: 99%