2010
DOI: 10.5121/vlsic.2010.1405
|View full text |Cite
|
Sign up to set email alerts
|

Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory

Abstract: Abstract.A high speed security algorithm is always important for wired/wireless environment. The KeywordsAES pipelining, Key pipelining, Search Based Memory, VLSI. 1.IntroductionNetwork security has three major security goals: confidentiality, availability and message integration between senders and receivers . Many algorithms are available in each of these three goals of security. One of the frequently used security algorithm in block cipher is the AES algorithm [3]. High speed security decisions are impor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…A Hardware implementation of the AES was used for Encryption and Decryption. [5]. A framework containing four different modules namely Public key-Public key technique, Public key-Private key technique, Private Key-Public key technique and Private Key-Private key technique was used for data security.…”
Section: Literature Surveymentioning
confidence: 99%
“…A Hardware implementation of the AES was used for Encryption and Decryption. [5]. A framework containing four different modules namely Public key-Public key technique, Public key-Private key technique, Private Key-Public key technique and Private Key-Private key technique was used for data security.…”
Section: Literature Surveymentioning
confidence: 99%
“…There exist many presentations of hardware implementations of AES algorithms in literature. [32]. Unfortunately, most of those implementations are too costly for practical applications.…”
Section: Previous Workmentioning
confidence: 99%