Proceedings of ISCAS'95 - International Symposium on Circuits and Systems
DOI: 10.1109/iscas.1995.521534
|View full text |Cite
|
Sign up to set email alerts
|

On the VLSI implementation of the international data encryption algorithm IDEA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(12 citation statements)
references
References 7 publications
0
12
0
Order By: Relevance
“…Zimmermann (1994) 8 stage pipeline used Efficient but incompatible for high speed network applications. Wolter (1995) 10 stage pipeline used Additional area requirements due to on chip data management. Salomao (1998) RAMs were used for storing subkeys Unable to work with multiple keys.…”
Section: Comparison and Analysismentioning
confidence: 99%
“…Zimmermann (1994) 8 stage pipeline used Efficient but incompatible for high speed network applications. Wolter (1995) 10 stage pipeline used Additional area requirements due to on chip data management. Salomao (1998) RAMs were used for storing subkeys Unable to work with multiple keys.…”
Section: Comparison and Analysismentioning
confidence: 99%
“…al. [24] presented an implementation of the IDEA algorithm in which data are first encrypted and then, as a check, decrypted with the result compared to the original plaintext. Public key algorithms are analyzed in [8], where the authors propose an approach for providing error detection and correction by means of redundant arithmetic based on finite rings.…”
Section: Related Workmentioning
confidence: 99%
“…al. [13] developed a CED technique for symmetric block cipher IDEA wherein the test data was encrypted and then decrypted. This approach entails more than 100% time overhead.…”
Section: Ced Architectures For Symmetric Block Ciphers: Backgroundmentioning
confidence: 99%
“…al. [13] used residue codes for fault detection in adders, multipliers, and EXCLUSIVE-ORs. Area overhead of this approach is due to the encoders at the input and decoders at the output to translate the plain and cipher texts into the internal code words.…”
Section: Ced Architectures For Symmetric Block Ciphers: Backgroundmentioning
confidence: 99%