2010
DOI: 10.1007/978-3-642-14478-3_23
|View full text |Cite
|
Sign up to set email alerts
|

Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory

Abstract: A high speed security algorithm is always important for wired/wireless environment. The symmetric block cipher plays a major role in the bulk data encryption. One of the best existing symmetric security algorithms to provide data security is AES. AES has the advantage of being implemented in both hardware and software. Hardware implementation of the AES has the advantage of increased throughput and offers better security. Search based S-box architecture has been proposed in this paper to reduce the constraint … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…Also, each round in the AES algorithm needs round key from the key expansion algorithm. So the AES algorithm depends on the speed of the round key www.ijacsa.thesai.org generation [16]. In contrast, the ETSFS algorithm needs the key generation only one time before doing the encrypt function.…”
Section: ) Execution Timementioning
confidence: 99%
See 1 more Smart Citation
“…Also, each round in the AES algorithm needs round key from the key expansion algorithm. So the AES algorithm depends on the speed of the round key www.ijacsa.thesai.org generation [16]. In contrast, the ETSFS algorithm needs the key generation only one time before doing the encrypt function.…”
Section: ) Execution Timementioning
confidence: 99%
“…Moreover, hardware issues may cause inconsistent relations. The AES algorithm consumes more time than the ETSFS algorithm for selecting queries because in the AES algorithm, the decryption module depends mainly on the key expansion module [16]. Also, the execution of the query that retrieves the complete table consumes little more time than those that depend on the condition because the former retrieves more tuples than the latter; this tuples need more decryption operations.…”
Section: ) Execution Timementioning
confidence: 99%
“…Test generation has been considered for analog circuits such as in [13], [25], [20], for mixed-signal circuits such as in [2], [15], [14], [29], [30], using a variety of techniques, such as static test generation [23], [28], sensitivity computation [13], Monte-Carlo simulation [25], [26], and optimization [5].…”
Section: Introductionmentioning
confidence: 99%