Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core
Citations
2,687 citations
[...]
848 citations
733 citations
479 citations
457 citations
References
2,687 citations
"Design and Implementation of Low-Ar..." refers background in this paper
...Roundkey generation (key expansion) includes S-box substitutions, word rotations, and XOR operations performed on the encryption key....
[...]
...AES [11] is a symmetric cipher that processes data in 128-bit blocks....
[...]
...As Advanced Encryption Standard (AES) [11] is a standardized encryption algorithm and considered secure, it has become the default choice in numerous applications, including the standard wireless technologies IEEE 802.11i [9], IEEE 802.15.4 [8], and ZigBee [15]....
[...]
722 citations
721 citations
"Design and Implementation of Low-Ar..." refers background in this paper
...According to our knowledge, only two 8-bit AES ASICs have previously been reported in the academic literature [4, 5]....
[...]
709 citations
465 citations