Research Article

Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN

Figure 6

Block ciphers used to implement the authenticated encryption scheme. To the left, the architecture of AES; to the right, the architecture of PRESENT.