2021
DOI: 10.1109/jiot.2021.3052184
|View full text |Cite
|
Sign up to set email alerts
|

Scalable and Efficient Hardware Architectures for Authenticated Encryption in IoT Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 27 publications
(5 citation statements)
references
References 28 publications
0
5
0
Order By: Relevance
“…The Ascon AEAD scheme can mitigate such vulnerabilities by improving throughput and security with a field-programmable gate array platform, which provides higher speed, lower cost, faster development time, flexibility and configurability [82]. This improvement prevents attacks and secure the hardware from attacks [83].…”
Section: Cryptographic Protocols To Secure Medical Devicesmentioning
confidence: 99%
“…The Ascon AEAD scheme can mitigate such vulnerabilities by improving throughput and security with a field-programmable gate array platform, which provides higher speed, lower cost, faster development time, flexibility and configurability [82]. This improvement prevents attacks and secure the hardware from attacks [83].…”
Section: Cryptographic Protocols To Secure Medical Devicesmentioning
confidence: 99%
“…Ascon is an AE scheme based on permutations. Khan et al [22] discussed hardware implementation of Ascon employing different strategies (unrolled, round-based, and serialized). Implementing one permutation round in one clock cycle requires 2.06k LUTs in a Spartan-6 device.…”
Section: Related Workmentioning
confidence: 99%
“…Two Ascon implementations are discussed here. The first implementation [22] consumes 17% more area and generates 30% less TP and 40% less TP/A, compared to Gimli. Since these implementations are similar (both are based on one round per clock cycle), Gimli outperforms because of its inherent structure.…”
Section: Comparisonmentioning
confidence: 99%
“…Two of these approaches are the multiplier and the adder, and they are used in the process of putting modular multiplication into action (MM). Using the Montgomery multiplication technique is another example of multiplierbased architecture [8]. Another example is designing for a certain prime field.…”
Section: Introductionmentioning
confidence: 99%