Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE), 2015 2015
DOI: 10.7873/date.2015.0834
|View full text |Cite
|
Sign up to set email alerts
|

Comparison of Multi-Purpose Cores of Keccak and AES

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…The FL KECCAK architecture achieves 16.49 Gbps throughput which becomes almost double for LU2 architecture. The FL and LU2 KECCAK achieve better throughput than [27,[30][31][32][33][34][35][36][37][38][39][40]. Table 3 shows, the two-stage pipeline adopted in PP2-LU2 architecture achieved better throughput than the fastest KECCAK until date proposed in [41].…”
Section: Implementation and Resultsmentioning
confidence: 99%
“…The FL KECCAK architecture achieves 16.49 Gbps throughput which becomes almost double for LU2 architecture. The FL and LU2 KECCAK achieve better throughput than [27,[30][31][32][33][34][35][36][37][38][39][40]. Table 3 shows, the two-stage pipeline adopted in PP2-LU2 architecture achieved better throughput than the fastest KECCAK until date proposed in [41].…”
Section: Implementation and Resultsmentioning
confidence: 99%
“…Even if the interface allows the user to enter inputs and extract outputs incrementally, everything fits in the 384 bits of the permutation plus a couple of pointers for bookkeeping. In a different (i.e., non-lightweight) context, Yalla et al showed the benefits of such a construction in terms of area in a hardware implementation [YHK15]. Not surprisingly, many candidates to the NIST Lightweight Cryptography Standardization Process adopted the same strategy [DHP + 19].…”
Section: Lightweight?mentioning
confidence: 99%
“…A more recent configurable co-processor, CoARX, exploits operational similarity between cryptographic functions to implement different block ciphers, hash functions, stream ciphers that are based on ARX family of ciphers [27]. FPGA implementation of AES and Keccak multi functional cores have been compared with each other in [28].…”
Section: Previous Work and Motivationmentioning
confidence: 99%