2009 Proceedings of ESSCIRC 2009
DOI: 10.1109/esscirc.2009.5326020
|View full text |Cite
|
Sign up to set email alerts
|

A 1.69 Gb/s area-efficient AES crypto core with compact on-the-fly key expansion unit

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 5 publications
0
10
0
Order By: Relevance
“…Our architecture employs only one 128-bit 4-in-1 multiplexer, whereas conventional ones employ several 128-bit multiplexers. For example, the datapath in [21] employs seven 128-bit multiplexers. 1 Fewer selectors can reduce the critical path delay and circuit area and solve the false critical path problem.…”
Section: Round Function Partmentioning
confidence: 99%
See 2 more Smart Citations
“…Our architecture employs only one 128-bit 4-in-1 multiplexer, whereas conventional ones employ several 128-bit multiplexers. For example, the datapath in [21] employs seven 128-bit multiplexers. 1 Fewer selectors can reduce the critical path delay and circuit area and solve the false critical path problem.…”
Section: Round Function Partmentioning
confidence: 99%
“…2. Some architectures such as [9], [21] unify AddInitialKey and AddRoundKeys. We did not unify them to avoid increasing the number of selectors.…”
Section: Round Function Partmentioning
confidence: 99%
See 1 more Smart Citation
“…During decryption, these operations are reversed by inverting the arithmetic computations and permute transformations performed on the plain-text bytes in the encryption process. Conventional hardware accelerators use a 128 bit datapath organized as 16 byte-slices with 64 wiring tracks for the ShiftRows permutations to achieve single-cycle round latency, and 10-cycle throughput [2]- [5]. Higher throughput can be achieved by pipelining multiple back-to-back round hardware [6].…”
Section: ) 2 Polynomials In 22 Nmmentioning
confidence: 99%
“…3 shows the crypto core design. The biomedical data is encrypted by AES-128 designed in [7]. Additionally, the ECC-163 processor with SHA-256 hash function is integrated for key exchange and user identification protocols in mobile environment.…”
Section: B Risc Corementioning
confidence: 99%