2019
DOI: 10.1109/tr.2018.2882484
|View full text |Cite
|
Sign up to set email alerts
|

Reliable Architecture-Oblivious Error Detection Schemes for Secure Cryptographic GCM Structures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 24 publications
(9 citation statements)
references
References 17 publications
0
9
0
Order By: Relevance
“…Figure 13 has illustrated the processing performance of 4-parallel AES-GCM hardware accelerator, which is compared to the other similar security mechanisms as @100 MHz frequency. We note that the eight-parallel high-performance AES-GCM architecture proposed in Reference [ 33 ] has the highest efficiency in both encryption and decryption computations with the highest hardware complexity. Conversely, the single pipelined AES-GCM architecture takes the most time cycles to complete the computation on the authenticated encryption [ 34 ], even more than the competitive AES combined with the light-weight Hash (LHash) algorithm proposed in the Reference [ 35 ].…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…Figure 13 has illustrated the processing performance of 4-parallel AES-GCM hardware accelerator, which is compared to the other similar security mechanisms as @100 MHz frequency. We note that the eight-parallel high-performance AES-GCM architecture proposed in Reference [ 33 ] has the highest efficiency in both encryption and decryption computations with the highest hardware complexity. Conversely, the single pipelined AES-GCM architecture takes the most time cycles to complete the computation on the authenticated encryption [ 34 ], even more than the competitive AES combined with the light-weight Hash (LHash) algorithm proposed in the Reference [ 35 ].…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…Finally, in Kermani and Azarderakhsh ( 2018 ), reliable error detection schemes for secure Galois Countermeasures Mode (GCM) cryptographic structures without dependency on architecture. By providing robust error detection mechanisms, perimeter security, and communications integrity in critical areas are improved.…”
Section: Methodsmentioning
confidence: 99%
“…Broadcast routing is a straightforward method of flooding messages with other vehicles in groups. This procedure ensures that the message is delivered to all vehicles (Sarker et al, 2020;Kermani and Azarderakhsh, 2018). Flooding ensures packet delivery by ensuring that every node in the network receives the packet.…”
Section: B Broadcast-based Routingmentioning
confidence: 99%