Abstract
In this paper we study the energy consumption of the AES block cipher on the highest possible level. As a case study of cryptographic algorithms and to explore energy consumption we used an ASIC implementation energy estimation tool to estimate energy consumption of hardware implementation of a high level implementation of the algorithm and here we present a detailed look to components contributtion to energy consumption and we explore the impact of implementation factors on energy consumption.
| Original language | English |
|---|---|
| Title of host publication | 2008 3rd International Conference on Information and Communication Technologis |
| Subtitle of host publication | From Theory to Applications, ICTTA |
| DOIs | |
| Publication status | Published - 15 Aug 2008 |
| Event | 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA - Damascus, Syrian Arab Republic Duration: 7 Apr 2008 → 11 Apr 2008 |
Publication series
| Name | 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA |
|---|
Conference
| Conference | 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA |
|---|---|
| Country/Territory | Syrian Arab Republic |
| City | Damascus |
| Period | 7/04/08 → 11/04/08 |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 7 Affordable and Clean Energy
Keywords
- AES
- Cryptographic algorithms
- Energy consumption
- Energy estimation
- Rjindael
Fingerprint
Dive into the research topics of 'High level energy consumption estimation of cryptographic algorithms the case of AES'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver