2020
DOI: 10.1109/tcsi.2020.2997916
|View full text |Cite
|
Sign up to set email alerts
|

Resource-Shared Crypto-Coprocessor of AES Enc/Dec With SHA-3

Abstract: Cryptographic co-processors are integral to the modern System-on-Chips. Flexibility in such designs serves dual purpose, i.e., it enables acceleration of different essential cryptographic primitives (Encryption/Authentication/Pseudo Random Number Generation (PRNG) ) and also results in design compaction via resource sharing. In this context, a novel resource-shared crypto-coprocessor, named AE$HA-3 is presented, which combines two National Institute of Standards and Technology (NIST) standardized algorithms, i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
18
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(19 citation statements)
references
References 37 publications
1
18
0
Order By: Relevance
“…Table II summarizes a performance comparison with other works at the minimum energy point. Although the energy efficiency is similar to the one reported in [7] and [6], authors in [7] employed non-standard logic cells, and authors in [6] implemented an additional memory macro inside the DTLS processor. In contrast, this work demonstrates an approach that fits in more general-purpose systems and low-cost technology nodes, enabling complex security instances in multiple embedded applications.…”
Section: Measurement Resultssupporting
confidence: 61%
See 1 more Smart Citation
“…Table II summarizes a performance comparison with other works at the minimum energy point. Although the energy efficiency is similar to the one reported in [7] and [6], authors in [7] employed non-standard logic cells, and authors in [6] implemented an additional memory macro inside the DTLS processor. In contrast, this work demonstrates an approach that fits in more general-purpose systems and low-cost technology nodes, enabling complex security instances in multiple embedded applications.…”
Section: Measurement Resultssupporting
confidence: 61%
“…Addressing AES acceleration requires special attention for the substitution byte operation (Sbox) resourcehungry block inside the AES algorithm [5]. Although some AES implementations report high energy-efficiency values [6], [7], they rely on adding exclusive-use memory macros and non-standard logic cells.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, the proposed system has the highest throughput, which is even twice as fast as a simple DCT compression and stream cipher system [47]. Also, the throughput of the proposed system is 62% higher than the FPGA-based system presented in [62], which accommodates a single AES-128 core with Keccakf[400]. Regarding the HW implementation area, the proposed system has the largest slice utilization.…”
Section: B the Hw Performancementioning
confidence: 99%
“…In [21], a compact AES through optimizing the mix columns and inverse mix columns transformations was obtained. The work [22] shared the circuitry of AES and SHA-3. A 60 Gbps reconfigurable cryptographic processor, including AES and SHA algorithms, was proposed in [23].…”
Section: Introductionmentioning
confidence: 99%