{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:26:24Z","timestamp":1750220784881,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,5,11]],"date-time":"2020-05-11T00:00:00Z","timestamp":1589155200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,5,11]]},"DOI":"10.1145\/3387902.3392624","type":"proceedings-article","created":{"date-parts":[[2020,5,25]],"date-time":"2020-05-25T22:41:17Z","timestamp":1590446477000},"page":"89-97","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Efficient architecture design for the AES-128 algorithm on embedded systems"],"prefix":"10.1145","author":[{"given":"Rupam","family":"Mondal","sequence":"first","affiliation":[{"name":"United States Naval Academy"}]},{"given":"Hau","family":"Ngo","sequence":"additional","affiliation":[{"name":"United States Naval Academy"}]},{"given":"James","family":"Shey","sequence":"additional","affiliation":[{"name":"United States Naval Academy"}]},{"given":"Ryan","family":"Rakvic","sequence":"additional","affiliation":[{"name":"United States Naval Academy"}]},{"given":"Owens","family":"Walker","sequence":"additional","affiliation":[{"name":"United States Naval Academy"}]},{"given":"Dane","family":"Brown","sequence":"additional","affiliation":[{"name":"United States Naval Academy"}]}],"member":"320","published-online":{"date-parts":[[2020,5,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2008.928756"},{"volume-title":"2016 28th International Conference on Microelectronics (ICM). 285--288","author":"Bahnasawi M. A.","key":"e_1_3_2_1_2_1","unstructured":"M. A. Bahnasawi , K. Ibrahim , A. Mohamed , M. K. Mohamed , A. Moustafa , K. Abdelmonem , Y. Ismail , and H. Mostafa . 2016. ASIC-oriented comparative review of hardware security algorithms for internet of things applications . In 2016 28th International Conference on Microelectronics (ICM). 285--288 . M. A. Bahnasawi, K. Ibrahim, A. Mohamed, M. K. Mohamed, A. Moustafa, K. Abdelmonem, Y. Ismail, and H. Mostafa. 2016. ASIC-oriented comparative review of hardware security algorithms for internet of things applications. In 2016 28th International Conference on Microelectronics (ICM). 285--288."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2903150.2903488"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"S. Chen W. Hu and Z. Li. 2019. High Performance Data Encryption with AES Implementation on FPGA. In 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity) IEEE Intl Conference on High Performance and Smart Computing (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS). 149--153.  S. Chen W. Hu and Z. Li. 2019. High Performance Data Encryption with AES Implementation on FPGA. In 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity) IEEE Intl Conference on High Performance and Smart Computing (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS). 149--153.","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2019.00036"},{"volume-title":"2015 International Conference on Communications, Management and Telecommunications (ComManTel). 99--102","author":"Dao V.","key":"e_1_3_2_1_5_1","unstructured":"V. Dao , A. Nguyen , V. Hoang , and T. Tran . 2015. An ASIC implementation of low area AES encryption core for wireless networks . In 2015 International Conference on Communications, Management and Telecommunications (ComManTel). 99--102 . V. Dao, A. Nguyen, V. Hoang, and T. Tran. 2015. An ASIC implementation of low area AES encryption core for wireless networks. In 2015 International Conference on Communications, Management and Telecommunications (ComManTel). 99--102."},{"key":"e_1_3_2_1_6_1","volume-title":"International Workshop on Embedded Computer Systems. Springer, 443--453","author":"H\u00e4m\u00e4l\u00e4inen Panu","year":"2007","unstructured":"Panu H\u00e4m\u00e4l\u00e4inen , Marko H\u00e4nnik\u00e4inen , and Timo D H\u00e4m\u00e4l\u00e4inen . 2007 . Review of hardware architectures for advanced encryption standard implementations considering wireless sensor networks . In International Workshop on Embedded Computer Systems. Springer, 443--453 . Panu H\u00e4m\u00e4l\u00e4inen, Marko H\u00e4nnik\u00e4inen, and Timo D H\u00e4m\u00e4l\u00e4inen. 2007. Review of hardware architectures for advanced encryption standard implementations considering wireless sensor networks. In International Workshop on Embedded Computer Systems. Springer, 443--453."},{"key":"e_1_3_2_1_7_1","volume-title":"National policy on the use of the advanced encryption standard (AES) to protect national security systems and national security information","author":"Hathaway Lynn","year":"2003","unstructured":"Lynn Hathaway . 2003. National policy on the use of the advanced encryption standard (AES) to protect national security systems and national security information . National Security Agency 23 ( 2003 ). Lynn Hathaway. 2003. National policy on the use of the advanced encryption standard (AES) to protect national security systems and national security information. National Security Agency 23 (2003)."},{"key":"e_1_3_2_1_8_1","unstructured":"Intel. 2010. AES-XTS: Advanced Encryption Standard Core. https:\/\/www.intel.com\/content\/www\/us\/en\/programmable\/solutions\/partners\/partner-profile\/cast-inc-\/ip\/aes-xts-advanced-encryption-standard-core.html  Intel. 2010. AES-XTS: Advanced Encryption Standard Core. https:\/\/www.intel.com\/content\/www\/us\/en\/programmable\/solutions\/partners\/partner-profile\/cast-inc-\/ip\/aes-xts-advanced-encryption-standard-core.html"},{"volume-title":"2015 International Conference on Pervasive Computing (ICPC). 1--4.","author":"Khose P. N.","key":"e_1_3_2_1_9_1","unstructured":"P. N. Khose and V. G. Raut . 2015. Implementation of AES algorithm on FPGA for low area consumption . In 2015 International Conference on Pervasive Computing (ICPC). 1--4. P. N. Khose and V. G. Raut. 2015. Implementation of AES algorithm on FPGA for low area consumption. In 2015 International Conference on Pervasive Computing (ICPC). 1--4."},{"key":"e_1_3_2_1_10_1","first-page":"146","article-title":"Low power circuit architecture of AES crypto module for wireless sensor network","volume":"8","author":"Kim MooSeop","year":"2005","unstructured":"MooSeop Kim , Juhan Kim , and Yongje Choi . 2005 . Low power circuit architecture of AES crypto module for wireless sensor network . Proceedings of the World Academy of Science, Engineering and Technology 8 (2005), 146 -- 150 . MooSeop Kim, Juhan Kim, and Yongje Choi. 2005. Low power circuit architecture of AES crypto module for wireless sensor network. Proceedings of the World Academy of Science, Engineering and Technology 8 (2005), 146--150.","journal-title":"Proceedings of the World Academy of Science, Engineering and Technology"},{"volume-title":"2015 33rd IEEE International Conference on Computer Design (ICCD). 281--288","author":"Luo C.","key":"e_1_3_2_1_11_1","unstructured":"C. Luo , Y. Fei , P. Luo , S. Mukherjee , and D. Kaeli . 2015. Side-channel power analysis of a GPU AES implementation . In 2015 33rd IEEE International Conference on Computer Design (ICCD). 281--288 . C. Luo, Y. Fei, P. Luo, S. Mukherjee, and D. Kaeli. 2015. Side-channel power analysis of a GPU AES implementation. In 2015 33rd IEEE International Conference on Computer Design (ICCD). 281--288."},{"key":"e_1_3_2_1_12_1","unstructured":"OpenCores. 2012. Overview :: AES :: OpenCores. https:\/\/opencores.org\/projects\/tiny_aes  OpenCores. 2012. Overview :: AES :: OpenCores. https:\/\/opencores.org\/projects\/tiny_aes"},{"key":"e_1_3_2_1_13_1","volume-title":"GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489)","volume":"3","author":"Prasithsangaree P.","unstructured":"P. Prasithsangaree and P. Krishnamurthy . 2003. Analysis of energy consumption of RC4 and AES algorithms in wireless LANs . In GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489) , Vol. 3 . 1445--1449 vol.3. P. Prasithsangaree and P. Krishnamurthy. 2003. Analysis of energy consumption of RC4 and AES algorithms in wireless LANs. In GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489), Vol. 3. 1445--1449 vol.3."},{"key":"e_1_3_2_1_14_1","volume-title":"Wireless sensor networks: applications and challenges of ubiquitous sensing","author":"Puccinelli Daniele","year":"2005","unstructured":"Daniele Puccinelli and Martin Haenggi . 2005. Wireless sensor networks: applications and challenges of ubiquitous sensing . IEEE Circuits and systems magazine 5, 3 ( 2005 ), 19--31. Daniele Puccinelli and Martin Haenggi. 2005. Wireless sensor networks: applications and challenges of ubiquitous sensing. IEEE Circuits and systems magazine 5, 3 (2005), 19--31."},{"volume-title":"2015 9th International Conference on Sensing Technology (ICST). 773--778","author":"Rao M.","key":"e_1_3_2_1_15_1","unstructured":"M. Rao , T. Newe , and I. Grout . 2015. AES implementation on Xilinx FPGAs suitable for FPGA based WBSNs . In 2015 9th International Conference on Sensing Technology (ICST). 773--778 . M. Rao, T. Newe, and I. Grout. 2015. AES implementation on Xilinx FPGAs suitable for FPGA based WBSNs. In 2015 9th International Conference on Sensing Technology (ICST). 773--778."},{"key":"e_1_3_2_1_16_1","volume-title":"Executive Order 12356,\". National Security Information,\" The White House","author":"Reagan R","year":"1982","unstructured":"R Reagan . 1982. Executive Order 12356,\". National Security Information,\" The White House ( 1982 ). R Reagan. 1982. Executive Order 12356,\". National Security Information,\" The White House (1982)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69453-5_10"},{"key":"e_1_3_2_1_18_1","first-page":"1","article-title":"Announcing the advanced encryption standard (aes)","volume":"197","author":"Standard NIST-FIPS","year":"2001","unstructured":"NIST-FIPS Standard . 2001 . Announcing the advanced encryption standard (aes) . Federal Information Processing Standards Publication 197 , 1 - 51 (2001), 3--3. NIST-FIPS Standard. 2001. Announcing the advanced encryption standard (aes). Federal Information Processing Standards Publication 197, 1-51 (2001), 3--3.","journal-title":"Federal Information Processing Standards Publication"},{"key":"e_1_3_2_1_19_1","unstructured":"Xilinx. [n.d.]. AES Encryption \/ Decryption. https:\/\/www.xilinx.com\/products\/intellectual-property\/1-3fs9k9.html  Xilinx. [n.d.]. AES Encryption \/ Decryption. https:\/\/www.xilinx.com\/products\/intellectual-property\/1-3fs9k9.html"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksues.2018.07.002"}],"event":{"name":"CF '20: Computing Frontiers Conference","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"],"location":"Catania Sicily Italy","acronym":"CF '20"},"container-title":["Proceedings of the 17th ACM International Conference on Computing Frontiers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387902.3392624","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387902.3392624","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:36Z","timestamp":1750200096000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387902.3392624"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,11]]},"references-count":20,"alternative-id":["10.1145\/3387902.3392624","10.1145\/3387902"],"URL":"https:\/\/doi.org\/10.1145\/3387902.3392624","relation":{},"subject":[],"published":{"date-parts":[[2020,5,11]]},"assertion":[{"value":"2020-05-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}