2008 International Conference on Signals and Electronic Systems 2008
DOI: 10.1109/icses.2008.4673377
|View full text |Cite
|
Sign up to set email alerts
|

AES hardware implementation in FPGA for algorithm acceleration purpose

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(10 citation statements)
references
References 2 publications
0
10
0
Order By: Relevance
“…Moreover, hardware acceleration can be used for keeping energy consumption and throughput values at a reasonable level when executing public-key cryptography algorithms [73]. Furthermore, the use of specific hardware can also speed up the execution of cryptographic algorithms such as hash algorithms [74] or block ciphers [75].…”
Section: Energy Efficient Security Mechanismsmentioning
confidence: 99%
“…Moreover, hardware acceleration can be used for keeping energy consumption and throughput values at a reasonable level when executing public-key cryptography algorithms [73]. Furthermore, the use of specific hardware can also speed up the execution of cryptographic algorithms such as hash algorithms [74] or block ciphers [75].…”
Section: Energy Efficient Security Mechanismsmentioning
confidence: 99%
“…AES algorithm throughput can be increased by using folded parallel architecture [13].Through put can be further increased by introducing 2-slow retiming technique [14].A light weight Mix Column structure can be designed using [16]. By using X time based MixColumn transformation the speed circuit can be increased along the reduced area [17][18][19][20][21][22][23][24][25].…”
Section: 1 Related Workmentioning
confidence: 99%
“…Advanced Encryption Standard (AES), also know as Rijndael, is the most popular encryption technique that researches have implemented in FPGAs, with 510 documents. These implementations have been made to increase the encryption speed [406][407][408][409][410], generate small footprint and cheap designs [167,411,412], test the encryption against fault injections/attacks [413,414] and to improve the fault detection/tolerance systems [366,415,416]. Elliptic Curve Cryptography (ECC) is increasingly used in practice to instantiate public-key cryptography protocols, based on the algebraic structure of elliptic curves over finite fields [417].…”
Section: Cryptography Techniquesmentioning
confidence: 99%