2017 14th International Bhurban Conference on Applied Sciences and Technology (IBCAST) 2017
DOI: 10.1109/ibcast.2017.7868088
|View full text |Cite
|
Sign up to set email alerts
|

Performance comparison of KASUMI and hardware architecture optimization of f8 and f9 algorithms for 3g UMTS networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…To meet the requirement of the Internet of ings, cryptographic algorithms are frequently optimized for area reduction and high throughput implementation or to achieve a good tradeoff between throughput and speed [12][13][14][15][16][17][18][19][20][21][22][23][24][25]. For low-area design, reutilization/logic optimization methodologies have been widely adopted thereby implementing s-boxes using combinational logic [12][13][14][15][16][17][18][19][20]. A single-round MISTY1 architecture designed for compact implementation is proposed in [20] consisting of only oddround functions, i.e., 2 × FL functions, 1 × FO function, and 1 × 32 bit XOR.…”
Section: Introductionmentioning
confidence: 99%
“…To meet the requirement of the Internet of ings, cryptographic algorithms are frequently optimized for area reduction and high throughput implementation or to achieve a good tradeoff between throughput and speed [12][13][14][15][16][17][18][19][20][21][22][23][24][25]. For low-area design, reutilization/logic optimization methodologies have been widely adopted thereby implementing s-boxes using combinational logic [12][13][14][15][16][17][18][19][20]. A single-round MISTY1 architecture designed for compact implementation is proposed in [20] consisting of only oddround functions, i.e., 2 × FL functions, 1 × FO function, and 1 × 32 bit XOR.…”
Section: Introductionmentioning
confidence: 99%
“…A detailed study has been carried out on the existing hardware designs of MISTY1, KASUMI, AES, SHA-1, CAMELLIA and SAFER [5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22]. The review covered the comparison of performance parameters i.e.…”
Section: Introductionmentioning
confidence: 99%
“…In comparison to high throughput encryption cores, compact designs make use of the logic optimization techniques for transformation functions and s-boxes using combinational logic [5][6][7][8][9][10], [12][13][14][15][16][17][18], [21], [22]. Besides, re-utilization methodologies have also been implemented exploiting the rolling-feature of the architecture.…”
Section: Introductionmentioning
confidence: 99%