2011
DOI: 10.1016/j.micpro.2011.03.001
|View full text |Cite
|
Sign up to set email alerts
|

A compact AES core with on-line error-detection for FPGA applications with modest hardware resources

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 14 publications
0
10
0
Order By: Relevance
“…We can observe several technique methods for the reliability of AES system. The online error-detection method obtain the highefficiency because there is not extra fault tolerant circuit in this paper [22]. Our results achieved for the throughput, area (slices used and BRAMs), and high-efficiency are very good for a high reliability system array redundancy.…”
Section: S21mentioning
confidence: 65%
“…We can observe several technique methods for the reliability of AES system. The online error-detection method obtain the highefficiency because there is not extra fault tolerant circuit in this paper [22]. Our results achieved for the throughput, area (slices used and BRAMs), and high-efficiency are very good for a high reliability system array redundancy.…”
Section: S21mentioning
confidence: 65%
“…Several research studies have been developed on parallel AES hardware implementation targeting fault resilient, e.g. [2,13,[22][23][24]. In [13], a detection approach based on partial duplication, with ∼25% area overhead and negligible throughput degradation, is proposed for the parallel implementation of AES.…”
Section: Parallel Aesmentioning
confidence: 99%
“…the combination of time and hardware redundancies, in the first research, and is based on partial hardware redundancy in the next. Bui et al [2] and Legat et al [24] exploited parallel AES implementation. They picked one 32bit parallel block of AES to have low hardware overhead.…”
Section: Parallel Aesmentioning
confidence: 99%
“…There are very limited implementations on combined Look‐Up‐Table‐based AES; mostly, they are designed for 32‐bit datapath . These architectures are asymmetric with inefficient utilization of four BRAMs and two BRAMs , and in addition to this, they have also used extra multiplexers and rearrangement circuitry that not only result in utilization of extra hardware resources but also impose large overheads.…”
Section: Related Workmentioning
confidence: 99%