Research Article
Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN
Figure 6
Block ciphers used to implement the authenticated encryption scheme. To the left, the architecture of AES; to the right, the architecture of PRESENT.