2001
DOI: 10.1007/3-540-44709-1_8
|View full text |Cite
|
Sign up to set email alerts
|

Two Methods of Rijndael Implementation in Reconfigurable Hardware

Abstract: This paper presents an evaluation of the Rijndael cipher, the Advanced Encryption Standard winner, from the viewpoint of its implementation in a Field Programmable Devices (FPD). Starting with an analysis of algorithm's general characteristics a general cipher structure is described. Two different methods of Rijndael algorithm mapping to FPD are analyzed and suitability of available FPD families is evaluated. Finally, results of proposed mapping implemented in Altera FLEX, ACEX and APEX FPD are presented and c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
50
0

Year Published

2004
2004
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 88 publications
(50 citation statements)
references
References 3 publications
0
50
0
Order By: Relevance
“…The way to estimate density, speed, and power consumption of CMOL circuits has been described in [13]. If we estimate the cell area A cell as 64(F CMOS ) 2 [12], [13] with logic depth equal to 28, the same implementation on CMOL FPGA with will result the total gate delay equal to 0.15 ns, the total area equal to 84 µm 2 and the area-delay product equal to 12.6 µm 2 ns. A computer program was written for finding a pseudo-optimum yieldoptimized gate placement.…”
Section: Fig 6 Efficient Implementation Of Mixcolumns Transformationmentioning
confidence: 99%
See 1 more Smart Citation
“…The way to estimate density, speed, and power consumption of CMOL circuits has been described in [13]. If we estimate the cell area A cell as 64(F CMOS ) 2 [12], [13] with logic depth equal to 28, the same implementation on CMOL FPGA with will result the total gate delay equal to 0.15 ns, the total area equal to 84 µm 2 and the area-delay product equal to 12.6 µm 2 ns. A computer program was written for finding a pseudo-optimum yieldoptimized gate placement.…”
Section: Fig 6 Efficient Implementation Of Mixcolumns Transformationmentioning
confidence: 99%
“…Through three Advanced Encryption Standard (AES) conferences, Rijndael [1] was selected as AES in October 2000. After adoption of Rijndael, its VLSI realization was taken into consideration and nowadays it is integrated in many various embedded applications like Web Servers, ATMs, Fiber Distributed Data Interfaces (FDDIs), smart cards, cellular phones… Since 2000, several architectures for efficient VLSI realization of AES algorithm have been proposed and their performance evaluated using ASIC libraries and FPGAs [2], [3], [4], [5], [6], [7]. Further integration or speed-up of such circuits will not be easily possible in conventional manners.…”
Section: Introductionmentioning
confidence: 99%
“…The MixColumns transformation considers the four bytes in each column of the State as the coefficients of a polynomial over , and multiplies by modulo where (2) denotes the number " " in hexadecimal form, while the notation used later in this paper stands for " " in binary form. In matrix form, the MixColumns transformation can be expressed as (3) Finally, the AddRoundKey involves only bit-wise XOR operations.…”
Section: A the Aes Algorithmmentioning
confidence: 99%
“…Various architectures have been proposed for the implementation of the MixColumns/InvMixColumns transformation [3], [5], [7], [14], [15]. Applying substructure sharing both to the computation of a byte and between the computation of the four bytes in a column of the State, an efficient MixColumns implementation architecture can be derived.…”
Section: B Implementations Of the Mixcolumns/invmixcolumns Transformmentioning
confidence: 99%
“…Early AES designs were mostly straightforward implementations of various loop unrolled and pipelined architecture [2][3][4][5][6] with limited number of architectural optimizations, which resulted in poor resource utilization. Later FPGA implementations focused on better utilization of FPGA resources [7][8][9][10].…”
Section: Introductionmentioning
confidence: 99%