版权说明 操作指南
首页 > 成果 > 详情

Low area and high throughput hardware implementations for the LILLIPUT cipher

认领
导出
Link by DOI
反馈
分享
QQ微信 微博
成果类型:
期刊论文
作者:
Yang, Jinling;Li, Lang;Huang, Xiantong
通讯作者:
Li, L
作者机构:
[Yang, Jinling; Li, Lang; Huang, Xiantong] Hengyang Normal Univ, Coll Comp Sci & Technol, Hengyang 421002, Peoples R China.
[Yang, Jinling; Li, Lang; Huang, Xiantong] Hengyang Normal Univ, Hunan Prov Key Lab Intelligent Informat Proc & App, Hengyang, Peoples R China.
通讯机构:
[Li, L ] H
Hengyang Normal Univ, Coll Comp Sci & Technol, Hengyang 421002, Peoples R China.
语种:
英文
关键词:
Computational complexity;Constrained optimization;Cost effectiveness;Cryptography;Economic and social effects;Lyapunov methods;Scheduling algorithms;Security of data;Area optimized;Block ciphers;Hardware implementations;High-throughput;Lightweight;LILLIPUT block cipher;Loop unrolling;Low area;Low-costs;Low-high;Internet of things
期刊:
International Journal of Circuit Theory and Applications
ISSN:
0098-9886
年:
2023
卷:
52
期:
6
页码:
2971-2984
基金类别:
This work was supported by the Hunan Provincial Natural Science Foundation of China (grant number 2022JJ30103), “the 14th Five Year Plan” Key Disciplines and Application‐oriented Special Disciplines of Hunan Province (grant number Xiangjiaotong [2022] 351), the Science and Technology Innovation Program of Hunan Province (grant number 2016TP1020), and the Open Fund Project of Hunan Provincial Key Laboratory of Intelligent Information Processing and Application for Hengyang Normal University (grant number 2022HSKFJJ011).
机构署名:
本校为第一且通讯机构
院系归属:
计算机科学与技术学院
物理与电子工程学院
摘要:
The widespread use of Internet of Things devices has increased the demand for lower cost and more efficient lightweight ciphers. However, there is a difficult trade-off between cost and efficiency for lightweight block ciphers. The optimizations of area and throughput are important for some constrained environments. This paper proposes two novel hardware architectures for the LILLIPUT cipher. In the novel low area structure, a new permutation layer is provided for LILLIPUT. The relationship between encryption algorithm and key scheduling algori...

反馈

验证码:
看不清楚,换一个
确定
取消

成果认领

标题:
用户 作者 通讯作者
请选择
请选择
确定
取消

提示

该栏目需要登录且有访问权限才可以访问

如果您有访问权限,请直接 登录访问

如果您没有访问权限,请联系管理员申请开通

管理员联系邮箱:yun@hnwdkj.com