Research Article
Efficient (Masked) Hardware Implementation of Grain-128AEADv2
Figure 8
The security evaluation results of the (masked) hardware implementation of Grain-128AEADv2. (a) Straightforward. (b) Pipeline-like pre-computation. (c) Galois transformation. (d) Masking.
(a) |
(b) |
(c) |
(d) |