2013
DOI: 10.1080/00207217.2013.775626
|View full text |Cite
|
Sign up to set email alerts
|

A 0.13-µm implementation of 5 Gb/s and 3-mW folded parallel architecture for AES algorithm

Abstract: A new architecture for encrypting and decrypting the confidential data using Advanced Encryption Standard algorithm is presented in this article. This structure combines the folded structure with parallel architecture to increase the throughput. The whole architecture achieved high throughput with less power. The proposed architecture is implemented in 0.13-µm Complementary metal-oxide-semiconductor (CMOS) technology. The proposed structure is compared with different existing structures, and from the result it… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 14 publications
(16 reference statements)
0
2
0
Order By: Relevance
“…Moreover in [19] a parallel sub-pipelined architecture is introduced for high security applications producing high throughput. In [20] the architecture for both encryption and decryption using AES is designed by incorporating folded architecture with parallel architecture to increase the throughput and reduce the power consumption. In [21] a parallel sub-pipelined architecture is introduced for AES algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover in [19] a parallel sub-pipelined architecture is introduced for high security applications producing high throughput. In [20] the architecture for both encryption and decryption using AES is designed by incorporating folded architecture with parallel architecture to increase the throughput and reduce the power consumption. In [21] a parallel sub-pipelined architecture is introduced for AES algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…This method reduces the time consumption of round function significantly and is the fastest non-parallelised software implementation which has been adopted by many security systems like OpenSSL (Viega et al, 2002). Moreover, the LUT-based AES software implementations are more applicable than the ones based on hardware accelerators (Rahimunnisa et al, 2014;Abdellatif et al, 2014;Chang et al, 2013;Swankoski et al, 2005) or the ones based on instruction set extension (Rott, 2012;Lee and Chen, 2010;Yumbul et al, 2014) due to its' hardware-independency characteristic.…”
Section: Introductionmentioning
confidence: 99%