2018 International Conference on Electronics, Information, and Communication (ICEIC) 2018
DOI: 10.23919/elinfocom.2018.8330586
|View full text |Cite
|
Sign up to set email alerts
|

An AES-GCM authenticated encryption crypto-core for IoT security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 0 publications
0
12
0
Order By: Relevance
“…In the initial round, the text is Xored with the input key to produce the input of the next round while the second round starts with the subbytes steps [5,23,24].…”
Section: Fig 1 the Aes Encryption Systems Steps Of Each Roundmentioning
confidence: 99%
See 4 more Smart Citations
“…In the initial round, the text is Xored with the input key to produce the input of the next round while the second round starts with the subbytes steps [5,23,24].…”
Section: Fig 1 the Aes Encryption Systems Steps Of Each Roundmentioning
confidence: 99%
“…The element of every row is shifted due to the number of the rows, the first row is not shifted, the second row is where one element is shifted to the left, the third row is where the two elements are shifted to the left and the final row is where the three elements are shifted to the left as shown in Fig. 4 [4,5,16,23].…”
Section: B the Shiftraws Stepmentioning
confidence: 99%
See 3 more Smart Citations