2012
DOI: 10.1109/tvlsi.2011.2141693
|View full text |Cite
|
Sign up to set email alerts
|

Construction of Optimum Composite Field Architecture for Compact High-Throughput AES S-Boxes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 40 publications
(29 citation statements)
references
References 8 publications
0
29
0
Order By: Relevance
“…However, they report the bare minimal focus on the architectural design of the different symmetric lightweight security ciphers. All the lightweight ciphers defined so far have only look-up table-based S-boxes, which have their own limitations in hardware [18][19][20][21][22][23][24][25].…”
Section: Introductionmentioning
confidence: 99%
“…However, they report the bare minimal focus on the architectural design of the different symmetric lightweight security ciphers. All the lightweight ciphers defined so far have only look-up table-based S-boxes, which have their own limitations in hardware [18][19][20][21][22][23][24][25].…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, some structural optimization approaches have been widely employed to speed up the AES engines, such as parallel, pipelining, and subpipelining [117,41,30,159,163]. However, all the previous research focused on analyzing AES performance from the circuit perspective, based on the assumption that the 128-bit states can be input to AES engines immediately.…”
Section: High Security On-chip Bus Architecturementioning
confidence: 99%
“…Furthermore, since the composite field can be constructed by using different irreducible polynomials, [192] and [117] analyze and compare the complexity of the SB implementation with different constructions. In [192], how the coefficients of the field polynomials affect each block in the composite filed implementation of the SB transformation is illustrated, and then an optimum construction for the AES algorithm is presented.…”
Section: Aes Engine Optimizationmentioning
confidence: 99%
See 2 more Smart Citations