2020
DOI: 10.1007/978-981-15-7486-3_26
|View full text |Cite
|
Sign up to set email alerts
|

High Throughput Novel Architecture of SIT Cipher for IoT Application

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 18 publications
0
6
0
Order By: Relevance
“…Compared to the existing architectures, the utilization of LUTs and slices is reduced by 66.05% and 68.40% with respect to [22], 84.01% and 91.95% with respect to [13], 43.29% and 14.84% with respect to [33] and 47.56% with respect to [25]. The proposed TinyJAMBU-128 architecture has maximum frequency, F max of 128.15 MHz, which is better than [33] and [25].…”
Section: Hardware Implementation Resultsmentioning
confidence: 92%
See 3 more Smart Citations
“…Compared to the existing architectures, the utilization of LUTs and slices is reduced by 66.05% and 68.40% with respect to [22], 84.01% and 91.95% with respect to [13], 43.29% and 14.84% with respect to [33] and 47.56% with respect to [25]. The proposed TinyJAMBU-128 architecture has maximum frequency, F max of 128.15 MHz, which is better than [33] and [25].…”
Section: Hardware Implementation Resultsmentioning
confidence: 92%
“…The proposed TinyJAMBU-128 architecture has maximum frequency, F max of 128.15 MHz, which is better than [33] and [25]. Compared to the existing architectures implemented on the Virtex-7 FPGA device, the power usage of the proposed work is reduced by 87.41% with respect to [25] and 90.27% with respect to [22].…”
Section: Hardware Implementation Resultsmentioning
confidence: 93%
See 2 more Smart Citations
“…According to Wang et al [50] and Liu et al [70], the impossible dierentials attack attacked the 12 rounds of Camellia with the chosen plaintext of 2 120 and 2 181 . Even if intruders attack Camellia, Amishra and Acharya [71] recommended that Camellia be used in cryptographic images (CIs).…”
Section: Related Workmentioning
confidence: 99%