2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN) 2013
DOI: 10.1109/ice-ccn.2013.6528547
|View full text |Cite
|
Sign up to set email alerts
|

Loop parallelization and pipelining implementation of AES algorithm using OpenMP and FPGA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…Two implementations of the AES algorithm were introduced; the first one was based on the basic architecture of the AES and the second one on the sub-pipelined architecture. Banu et al [23] proposed high throughput hardware and software implementation of the AES algorithm. The hardware implementation was based on architectural optimization techniques like pipelining, loop unrolling and iterative design to increase the speed by processing multiple rounds simultaneously.…”
Section: Previous Workmentioning
confidence: 99%
“…Two implementations of the AES algorithm were introduced; the first one was based on the basic architecture of the AES and the second one on the sub-pipelined architecture. Banu et al [23] proposed high throughput hardware and software implementation of the AES algorithm. The hardware implementation was based on architectural optimization techniques like pipelining, loop unrolling and iterative design to increase the speed by processing multiple rounds simultaneously.…”
Section: Previous Workmentioning
confidence: 99%
“…In addition, Banu et al accelerated AES by combining hardware parallelism made by field‐programmable gate array and software parallelism (i.e., OpenMP). Currently, Liu and Baas parallelized AES on an Asynchronous Array of Simple Processors and gained better performance with higher energy efficiency.…”
Section: Related Workmentioning
confidence: 99%
“…In some typical applications, massive users' data are usually short but may be different in length. For example, in a secure socket layer (SSL), transferring data usually varies from 35 to 150KB, but different user's data may have a different length . If we just use GPU parallelism or CPU parallelism to accelerate encrypting in this situation, it does not fully utilize the computing performance of a CPU or GPU, because a GPU or CPU often encounter these short plaintexts.…”
Section: Introductionmentioning
confidence: 99%
“…LEA has 128-bit block size with 128, 192, 256-bit key sizes and rounds 24, 28 and 32 respectively. LEA supports simple ARX (addition rotation XOR ) operation, LEA is not using complex S-box structure like AES [4] hence it will give high-speed operation.LEA is independent of all attacks for block ciphers, which makes it more suitable for those places where we need both security with high performance. LEA uses some arbitrary constants in its algorithm which makes it more efficient to provide confusion and diffusion in encryption.…”
Section: Introductionmentioning
confidence: 99%