Research Article

Compact Implementations of HIGHT Block Cipher on IoT Platforms

Figure 1

(a) Round function and (b) subkey generation of HIGHT encryption, where X, K, and SK represent input data, master key, and subkey, respectively.
(a)
(b)