2016 29th IEEE International System-on-Chip Conference (SOCC) 2016
DOI: 10.1109/socc.2016.7905466
|View full text |Cite
|
Sign up to set email alerts
|

Efficient implementation of the AES algorithm for security applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(7 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…A simple bitwise XOR operation between each byte in the state matrix with its corresponding byte in the key matrix. The key matrix corresponds to the same round of the state matrix [34]. The final round consists of only three transformations ignoring MixColumns [35].…”
Section: Implementation Of Md5 Dan Aesmentioning
confidence: 99%
“…A simple bitwise XOR operation between each byte in the state matrix with its corresponding byte in the key matrix. The key matrix corresponds to the same round of the state matrix [34]. The final round consists of only three transformations ignoring MixColumns [35].…”
Section: Implementation Of Md5 Dan Aesmentioning
confidence: 99%
“…In Soliman et al [18] presented an optimized two versions of the AES algorithm in which a small and low power consumption implementation for security applications in IoT is provided. These designs use an iterative looping and pipelined architecture in developing the technique of implementing the AES-128 standard algorithm [18]. In [19] proposed reliable error detection architectures for two of famous Cryptographic algorithms (Simon and Speck).…”
Section: Related Workmentioning
confidence: 99%
“…ZigBee pro is improving the security in (Zigbee2006) by using two types of safely methods: a standard security method, appropriate to the resident security in (Zigbee2006) and high security method, appropriate with commercial security in (Zigbee2006). The security in ZigBee relies on Advanced Encryption Standard (AES-128) [4] algorithm. But in our proposed system, we will use RSA to improve the security and reduce run time.…”
Section: Zigbee Promentioning
confidence: 99%
“…The recipient will decrypt to check the integrity. Figure 4. show the suggested key administration in criterion safely method.…”
mentioning
confidence: 99%