The key requirements of High-speed Internet Protocol security (IPsec) applications are high throughput and flexible security engines. A new high-throughput, programmable cryptoprocessor that runs the AES algorithm in different operation modes is designed to meet these requirements. The device achieves a maximum throughput of 3.43 Gbps at a 295-MHz clock frequency using 0.18-micron CMOS technology. The instruction set includes initialization, key setup, and AES encryption for different operation modes. Block pipeline instructions allow AES to run in ECB, CBC-MAC, counter, and CCM modes in 11 clock cycles per 128-bit block without loss in throughput compared to an AES without a mode of operation.status: publishe
This paper explores the area-throughput trade-off for an ASIC implementation of the Advanced Encrypt...
Increased demand for data security is an undeniable fact. Towards achieving higher security, cryptog...
Abstract. Cryptographic methods are widely used within networking and digital rights management. Num...
This article presents a cryptographic hardware (HW) accelerator supporting multiple advanced encrypt...
This article presents a cryptographic hardware (HW) accelerator supporting multiple advanced encrypt...
[[abstract]]We propose a full-featured high-throughput low-power AES cipher which is suitable for wi...
This article presents a cryptographic hardware (HW) accelerator supporting multiple advanced encrypt...
This article presents a cryptographic hardware (HW) accelerator supporting multiple advanced encrypt...
This article presents a cryptographic hardware (HW) accelerator supporting multiple advanced encrypt...
[[abstract]]As networking technology advances, the gap between network bandwidth and network process...
[[abstract]]© 2003 Institute of Electrical and Electronics Engineers - We propose an efficient hardw...
[[abstract]]As networking technology advances, the gap between network bandwidth and network process...
[[abstract]]We propose a configurable AES processor for extended-security communication. The propose...
[[abstract]]We propose an efficient hardware implementation of the AES (Advanced Encryption Standard...
Abstract—This paper explores the area-throughput trade-off for an ASIC implementation of the Advance...
This paper explores the area-throughput trade-off for an ASIC implementation of the Advanced Encrypt...
Increased demand for data security is an undeniable fact. Towards achieving higher security, cryptog...
Abstract. Cryptographic methods are widely used within networking and digital rights management. Num...
This article presents a cryptographic hardware (HW) accelerator supporting multiple advanced encrypt...
This article presents a cryptographic hardware (HW) accelerator supporting multiple advanced encrypt...
[[abstract]]We propose a full-featured high-throughput low-power AES cipher which is suitable for wi...
This article presents a cryptographic hardware (HW) accelerator supporting multiple advanced encrypt...
This article presents a cryptographic hardware (HW) accelerator supporting multiple advanced encrypt...
This article presents a cryptographic hardware (HW) accelerator supporting multiple advanced encrypt...
[[abstract]]As networking technology advances, the gap between network bandwidth and network process...
[[abstract]]© 2003 Institute of Electrical and Electronics Engineers - We propose an efficient hardw...
[[abstract]]As networking technology advances, the gap between network bandwidth and network process...
[[abstract]]We propose a configurable AES processor for extended-security communication. The propose...
[[abstract]]We propose an efficient hardware implementation of the AES (Advanced Encryption Standard...
Abstract—This paper explores the area-throughput trade-off for an ASIC implementation of the Advance...
This paper explores the area-throughput trade-off for an ASIC implementation of the Advanced Encrypt...
Increased demand for data security is an undeniable fact. Towards achieving higher security, cryptog...
Abstract. Cryptographic methods are widely used within networking and digital rights management. Num...