Contexts in source publication

Context 1
... the output from the four S-boxes will be reorganized to form a 32-bit key. Table 4.1 shows the reorganization of the 32-bit key. ...
Context 2
... design was synthesized for 1-and 16-cycles of ICE algorithm. The extracted result of the synthesis report is shown in Table 4.2. Thus, the results shown are acceptable for limited size application which needs an implementation of encryption for security, as it only performs the operation in 14.4 ns for each encryption and decryption process. ...

Similar publications

Conference Paper
Full-text available
Bandwidth is a fundamental issue in the NoC (Network on Chip) design and increasing use of the third-party NoC IPs adds the security as another design concern. The thirdparty NoC may have hardware Trojans that can break the confidentiality and integrity of the data transferred over the NoC, thereafter exposing the system to varied attacks. Basicall...