2016
DOI: 10.1016/j.micpro.2016.04.006
|View full text |Cite
|
Sign up to set email alerts
|

GCM implementations of Camellia-128 and SMS4 by optimizing the polynomial multiplier

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
11
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(11 citation statements)
references
References 7 publications
0
11
0
Order By: Relevance
“…In the field of communications, with the improvement of bandwidth and performance requirements, traditional buses have been gradually phased out. At this time, the PCIe bus as a third-generation interconnect bus successfully solved the bottleneck problem during high-speed data transmission and obtained good applications [ 5 , 6 ], which also means that the era when the traditional parallel bus started to develop towards the high-speed serial bus has arrived. The performance of the PCIe bus is excellent.…”
Section: Introductionmentioning
confidence: 99%
“…In the field of communications, with the improvement of bandwidth and performance requirements, traditional buses have been gradually phased out. At this time, the PCIe bus as a third-generation interconnect bus successfully solved the bottleneck problem during high-speed data transmission and obtained good applications [ 5 , 6 ], which also means that the era when the traditional parallel bus started to develop towards the high-speed serial bus has arrived. The performance of the PCIe bus is excellent.…”
Section: Introductionmentioning
confidence: 99%
“…A detailed study has been carried out on the existing hardware designs of MISTY1, KASUMI, AES, SHA-1, CAMELLIA and SAFER [5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22]. The review covered the comparison of performance parameters i.e.…”
Section: Introductionmentioning
confidence: 99%
“…area, speed and frequency. For high speed architectures, the commonly employed schemes include Look-Up Tables (LUTs) or Block RAMs (BRAMs) implementation for s-boxes [10], [11], [19], [20]. In addition, optimizations are made for path delay reduction by effective pipe-lines implementation [11], [19].…”
Section: Introductionmentioning
confidence: 99%
“…The design and optimization of cryptographic algorithms have been studied in detail keeping in view the application requirements for low area, high speed or achieving a trade-off between area and speed [2,3,4,5,6,7,8,9,10,11]. For low area design, the commonly adopted methods include re-utilization of logic blocks and s-boxes optimization [2,3,4,5,6,7].…”
Section: Introductionmentioning
confidence: 99%
“…The compact MISTY1, however are highly unsuitable for high speed applications having low throughput values. Contrary to area-efficient design schemes, encryption algorithms including AES, KASUMI, CAMELLIA and MISTY1 employ RAMs/LUTs/combinational logic to substitute s-boxes using pipe-lined architecture for high speed implementations [7,8,9,10,11]. It is found that the non-optimized high-speed architectures implementing straight-forward pipelines require large area thus reducing the efficiency [7,11].…”
Section: Introductionmentioning
confidence: 99%