2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID) 2018
DOI: 10.1109/vlsid.2018.96
|View full text |Cite
|
Sign up to set email alerts
|

A High-Performance and Area-Efficient VLSI Architecture for the PRESENT Lightweight Cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
12
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(12 citation statements)
references
References 11 publications
0
12
0
Order By: Relevance
“…The sender did not need to send a simple key but the storage coordinates of the key matrix and the receiver obtained the key from the matrix according to the coordinates, which effectively improves the security of key transmission. Pandey et al [9] proposed a Very Large Scale Integration (VLSI) architecture, with high performance and a limited area of 64-bit data path for lightweight cipher PRESENT, which realized high throughput rate and low power consumption on FPGA. For meeting the security requirements of different application environments, different algorithms are required for the encryption and decryption system to process data.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The sender did not need to send a simple key but the storage coordinates of the key matrix and the receiver obtained the key from the matrix according to the coordinates, which effectively improves the security of key transmission. Pandey et al [9] proposed a Very Large Scale Integration (VLSI) architecture, with high performance and a limited area of 64-bit data path for lightweight cipher PRESENT, which realized high throughput rate and low power consumption on FPGA. For meeting the security requirements of different application environments, different algorithms are required for the encryption and decryption system to process data.…”
Section: Related Workmentioning
confidence: 99%
“…In the process of IoT data transmission, cryptographic algorithms are the most commonly effective means to guarantee data security [7,8,9]. The data volumes expansion and the IoT commoditization give computer hardware higher requirements for the speed, power consumption, and cost.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…To perform both encryption and decryption operations, FPGA implementations have been provided in [23, 28, 29]. In the implementation of [23], Spartan‐III FPGA has been used for encryption/decryption operations.…”
Section: Related Workmentioning
confidence: 99%
“…In recent years, several FPGA-based implementations of the HIGHT and PRESENT algorithms have been reported in the literature [11][12][13][14][15][16][17][18][19][20][21]. For example, the first lightweight implementations of the block ciphers HIGHT and PRESENT on FPGA are presented in [11].…”
Section: Introductionmentioning
confidence: 99%