Research Article

Efficient (Masked) Hardware Implementation of Grain-128AEADv2

Figure 8

The security evaluation results of the (masked) hardware implementation of Grain-128AEADv2. (a) Straightforward. (b) Pipeline-like pre-computation. (c) Galois transformation. (d) Masking.
(a)
(b)
(c)
(d)