diff --git a/makefiles/pseudomodules.inc.mk b/makefiles/pseudomodules.inc.mk
index 67b90547b159e80280c9b8a6e85c0e0860e3bb94..6a4551ad06a2c5e86e122b4e4caa6fa592f5dd98 100644
--- a/makefiles/pseudomodules.inc.mk
+++ b/makefiles/pseudomodules.inc.mk
@@ -127,4 +127,9 @@ PSEUDOMODULES += skald_eddystone
 # define optimized read function of DS18 driver as a pseudo module
 PSEUDOMODULES += ds18_optimized
 
+# By using this pseudomodule, T tables will be precalculated.
+PSEUDOMODULES += crypto_aes_precalculated
+# This pseudomodule causes a loop in AES to be unrolled (more flash, less CPU)
+PSEUDOMODULES += crypto_aes_unroll
+
 # Packages may also add modules to PSEUDOMODULES in their `Makefile.include`.
diff --git a/sys/crypto/aes.c b/sys/crypto/aes.c
index c36a5b810fe31fd3919cd7775ec39a6ccb0cb01e..c8809640c7f157fae517c51e9c8beb57f6bb4c87 100644
--- a/sys/crypto/aes.c
+++ b/sys/crypto/aes.c
@@ -18,6 +18,9 @@
  * @author      Fabrice Bellard
  * @author      Zakaria Kasmi <zkasmi@inf.fu-berlin.de>
  *
+ * @author      Unwired Devices LLC
+ * @author      Oleg Artamonov <oleg@unwds.com>
+ *
  * @note        Integrated in QEMU by Fabrice Bellard from the OpenSSL project.
  *              @version 3.0 (December 2000). Optimised ANSI C code for the
  *              Rijndael cipher (now AES).
@@ -115,6 +118,20 @@ static const u32 Te0[256] = {
     0x824141c3U, 0x299999b0U, 0x5a2d2d77U, 0x1e0f0f11U,
     0x7bb0b0cbU, 0xa85454fcU, 0x6dbbbbd6U, 0x2c16163aU,
 };
+
+#ifndef MODULE_CRYPTO_AES_PRECALCULATED
+    #define Te0(n)  (Te0[n])
+    #define Te1(n)  ((Te0[n] >>  8) | (Te0[n] << 24))
+    #define Te2(n)  ((Te0[n] >> 16) | (Te0[n] << 16))
+    #define Te3(n)  ((Te0[n] >> 24) | (Te0[n] <<  8))
+    #define Te4(n)  (((Te0[n] & 0x00FFFF00) >> 8) | ((Te0[n] & 0x00FFFF00) << 8))
+#else /* MODULE_CRYPTO_AES_PRECALCULATED */
+    #define Te0(n)  (Te0[n])
+    #define Te1(n)  (Te1[n])
+    #define Te2(n)  (Te2[n])
+    #define Te3(n)  (Te3[n])
+    #define Te4(n)  (Te4[n])
+
 static const u32 Te1[256] = {
     0xa5c66363U, 0x84f87c7cU, 0x99ee7777U, 0x8df67b7bU,
     0x0dfff2f2U, 0xbdd66b6bU, 0xb1de6f6fU, 0x5491c5c5U,
@@ -380,6 +397,8 @@ static const u32 Te4[256] = {
     0x41414141U, 0x99999999U, 0x2d2d2d2dU, 0x0f0f0f0fU,
     0xb0b0b0b0U, 0x54545454U, 0xbbbbbbbbU, 0x16161616U,
 };
+#endif /* MODULE_CRYPTO_AES_PRECALCULATED */
+
 static const u32 Td0[256] = {
     0x51f4a750U, 0x7e416553U, 0x1a17a4c3U, 0x3a275e96U,
     0x3bab6bcbU, 0x1f9d45f1U, 0xacfa58abU, 0x4be30393U,
@@ -446,6 +465,55 @@ static const u32 Td0[256] = {
     0x39a80171U, 0x080cb3deU, 0xd8b4e49cU, 0x6456c190U,
     0x7bcb8461U, 0xd532b670U, 0x486c5c74U, 0xd0b85742U,
 };
+
+#ifndef MODULE_CRYPTO_AES_PRECALCULATED
+    #define Td0(n)  (Td0[n])
+    #define Td1(n)  ((Td0[n] >>  8) | (Td0[n] << 24))
+    #define Td2(n)  ((Td0[n] >> 16) | (Td0[n] << 16))
+    #define Td3(n)  ((Td0[n] >> 24) | (Td0[n] <<  8))
+    #define Td4(n)  (Td4[n] | (Td4[n] << 8) | (Td4[n] << 16) | (Td4[n] << 24))
+
+static const u8 Td4[256] = {
+    0x52U, 0x09U, 0x6aU, 0xd5U, 0x30U, 0x36U, 0xa5U, 0x38U,
+    0xbfU, 0x40U, 0xa3U, 0x9eU, 0x81U, 0xf3U, 0xd7U, 0xfbU,
+    0x7cU, 0xe3U, 0x39U, 0x82U, 0x9bU, 0x2fU, 0xffU, 0x87U,
+    0x34U, 0x8eU, 0x43U, 0x44U, 0xc4U, 0xdeU, 0xe9U, 0xcbU,
+    0x54U, 0x7bU, 0x94U, 0x32U, 0xa6U, 0xc2U, 0x23U, 0x3dU,
+    0xeeU, 0x4cU, 0x95U, 0x0bU, 0x42U, 0xfaU, 0xc3U, 0x4eU,
+    0x08U, 0x2eU, 0xa1U, 0x66U, 0x28U, 0xd9U, 0x24U, 0xb2U,
+    0x76U, 0x5bU, 0xa2U, 0x49U, 0x6dU, 0x8bU, 0xd1U, 0x25U,
+    0x72U, 0xf8U, 0xf6U, 0x64U, 0x86U, 0x68U, 0x98U, 0x16U,
+    0xd4U, 0xa4U, 0x5cU, 0xccU, 0x5dU, 0x65U, 0xb6U, 0x92U,
+    0x6cU, 0x70U, 0x48U, 0x50U, 0xfdU, 0xedU, 0xb9U, 0xdaU,
+    0x5eU, 0x15U, 0x46U, 0x57U, 0xa7U, 0x8dU, 0x9dU, 0x84U,
+    0x90U, 0xd8U, 0xabU, 0x00U, 0x8cU, 0xbcU, 0xd3U, 0x0aU,
+    0xf7U, 0xe4U, 0x58U, 0x05U, 0xb8U, 0xb3U, 0x45U, 0x06U,
+    0xd0U, 0x2cU, 0x1eU, 0x8fU, 0xcaU, 0x3fU, 0x0fU, 0x02U,
+    0xc1U, 0xafU, 0xbdU, 0x03U, 0x01U, 0x13U, 0x8aU, 0x6bU,
+    0x3aU, 0x91U, 0x11U, 0x41U, 0x4fU, 0x67U, 0xdcU, 0xeaU,
+    0x97U, 0xf2U, 0xcfU, 0xceU, 0xf0U, 0xb4U, 0xe6U, 0x73U,
+    0x96U, 0xacU, 0x74U, 0x22U, 0xe7U, 0xadU, 0x35U, 0x85U,
+    0xe2U, 0xf9U, 0x37U, 0xe8U, 0x1cU, 0x75U, 0xdfU, 0x6eU,
+    0x47U, 0xf1U, 0x1aU, 0x71U, 0x1dU, 0x29U, 0xc5U, 0x89U,
+    0x6fU, 0xb7U, 0x62U, 0x0eU, 0xaaU, 0x18U, 0xbeU, 0x1bU,
+    0xfcU, 0x56U, 0x3eU, 0x4bU, 0xc6U, 0xd2U, 0x79U, 0x20U,
+    0x9aU, 0xdbU, 0xc0U, 0xfeU, 0x78U, 0xcdU, 0x5aU, 0xf4U,
+    0x1fU, 0xddU, 0xa8U, 0x33U, 0x88U, 0x07U, 0xc7U, 0x31U,
+    0xb1U, 0x12U, 0x10U, 0x59U, 0x27U, 0x80U, 0xecU, 0x5fU,
+    0x60U, 0x51U, 0x7fU, 0xa9U, 0x19U, 0xb5U, 0x4aU, 0x0dU,
+    0x2dU, 0xe5U, 0x7aU, 0x9fU, 0x93U, 0xc9U, 0x9cU, 0xefU,
+    0xa0U, 0xe0U, 0x3bU, 0x4dU, 0xaeU, 0x2aU, 0xf5U, 0xb0U,
+    0xc8U, 0xebU, 0xbbU, 0x3cU, 0x83U, 0x53U, 0x99U, 0x61U,
+    0x17U, 0x2bU, 0x04U, 0x7eU, 0xbaU, 0x77U, 0xd6U, 0x26U,
+    0xe1U, 0x69U, 0x14U, 0x63U, 0x55U, 0x21U, 0x0cU, 0x7dU,
+};
+#else
+    #define Td0(n)  (Td0[n])
+    #define Td1(n)  (Td1[n])
+    #define Td2(n)  (Td2[n])
+    #define Td3(n)  (Td3[n])
+    #define Td4(n)  (Td4[n])
+
 static const u32 Td1[256] = {
     0x5051f4a7U, 0x537e4165U, 0xc31a17a4U, 0x963a275eU,
     0xcb3bab6bU, 0xf11f9d45U, 0xabacfa58U, 0x934be303U,
@@ -711,6 +779,7 @@ static const u32 Td4[256] = {
     0xe1e1e1e1U, 0x69696969U, 0x14141414U, 0x63636363U,
     0x55555555U, 0x21212121U, 0x0c0c0c0cU, 0x7d7d7d7dU,
 };
+#endif /* MODULE_CRYPTO_AES_PRECALCULATED */
 
 /* for 128-bit blocks, Rijndael never uses more than 10 rcon values */
 static const u32 rcon[] = {
@@ -785,10 +854,10 @@ static int aes_set_encrypt_key(const unsigned char *userKey, const int bits,
         while (1) {
             temp  = rk[3];
             rk[4] = rk[0] ^
-                    (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
-                    (Te4[(temp >>  8) & 0xff] & 0x00ff0000) ^
-                    (Te4[(temp) & 0xff]       & 0x0000ff00) ^
-                    (Te4[(temp >> 24)       ] & 0x000000ff) ^
+                    (Te4((temp >> 16) & 0xff) & 0xff000000) ^
+                    (Te4((temp >>  8) & 0xff) & 0x00ff0000) ^
+                    (Te4((temp) & 0xff)       & 0x0000ff00) ^
+                    (Te4((temp >> 24)       ) & 0x000000ff) ^
                     rcon[i];
             rk[5] = rk[1] ^ rk[4];
             rk[6] = rk[2] ^ rk[5];
@@ -809,10 +878,10 @@ static int aes_set_encrypt_key(const unsigned char *userKey, const int bits,
         while (1) {
             temp = rk[ 5];
             rk[ 6] = rk[ 0] ^
-                     (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
-                     (Te4[(temp >>  8) & 0xff] & 0x00ff0000) ^
-                     (Te4[(temp) & 0xff]       & 0x0000ff00) ^
-                     (Te4[(temp >> 24)       ] & 0x000000ff) ^
+                     (Te4((temp >> 16) & 0xff) & 0xff000000) ^
+                     (Te4((temp >>  8) & 0xff) & 0x00ff0000) ^
+                     (Te4((temp) & 0xff)       & 0x0000ff00) ^
+                     (Te4((temp >> 24)       ) & 0x000000ff) ^
                      rcon[i];
             rk[ 7] = rk[ 1] ^ rk[ 6];
             rk[ 8] = rk[ 2] ^ rk[ 7];
@@ -835,10 +904,10 @@ static int aes_set_encrypt_key(const unsigned char *userKey, const int bits,
         while (1) {
             temp = rk[ 7];
             rk[ 8] = rk[ 0] ^
-                     (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
-                     (Te4[(temp >>  8) & 0xff] & 0x00ff0000) ^
-                     (Te4[(temp) & 0xff]       & 0x0000ff00) ^
-                     (Te4[(temp >> 24)       ] & 0x000000ff) ^
+                     (Te4((temp >> 16) & 0xff) & 0xff000000) ^
+                     (Te4((temp >>  8) & 0xff) & 0x00ff0000) ^
+                     (Te4((temp) & 0xff)       & 0x0000ff00) ^
+                     (Te4((temp >> 24)       ) & 0x000000ff) ^
                      rcon[i];
             rk[ 9] = rk[ 1] ^ rk[ 8];
             rk[10] = rk[ 2] ^ rk[ 9];
@@ -850,10 +919,10 @@ static int aes_set_encrypt_key(const unsigned char *userKey, const int bits,
 
             temp = rk[11];
             rk[12] = rk[ 4] ^
-                     (Te4[(temp >> 24)       ] & 0xff000000) ^
-                     (Te4[(temp >> 16) & 0xff] & 0x00ff0000) ^
-                     (Te4[(temp >>  8) & 0xff] & 0x0000ff00) ^
-                     (Te4[(temp) & 0xff]       & 0x000000ff);
+                     (Te4((temp >> 24)       ) & 0xff000000) ^
+                     (Te4((temp >> 16) & 0xff) & 0x00ff0000) ^
+                     (Te4((temp >>  8) & 0xff) & 0x0000ff00) ^
+                     (Te4((temp) & 0xff)       & 0x000000ff);
             rk[13] = rk[ 5] ^ rk[12];
             rk[14] = rk[ 6] ^ rk[13];
             rk[15] = rk[ 7] ^ rk[14];
@@ -906,26 +975,36 @@ static int aes_set_decrypt_key(const unsigned char *userKey, const int bits,
      **/
     for (i = 1; i < (key->rounds); i++) {
         rk += 4;
+#ifdef MODULE_CRYPTO_AES_UNROLL
         rk[0] =
-            Td0[Te4[(rk[0] >> 24)       ] & 0xff] ^
-            Td1[Te4[(rk[0] >> 16) & 0xff] & 0xff] ^
-            Td2[Te4[(rk[0] >>  8) & 0xff] & 0xff] ^
-            Td3[Te4[(rk[0]) & 0xff]       & 0xff];
+            Td0(Te4((rk[0] >> 24)       ) & 0xff) ^
+            Td1(Te4((rk[0] >> 16) & 0xff) & 0xff) ^
+            Td2(Te4((rk[0] >>  8) & 0xff) & 0xff) ^
+            Td3(Te4((rk[0]) & 0xff)       & 0xff);
         rk[1] =
-            Td0[Te4[(rk[1] >> 24)       ] & 0xff] ^
-            Td1[Te4[(rk[1] >> 16) & 0xff] & 0xff] ^
-            Td2[Te4[(rk[1] >>  8) & 0xff] & 0xff] ^
-            Td3[Te4[(rk[1]) & 0xff]       & 0xff];
+            Td0(Te4((rk[1] >> 24)       ) & 0xff) ^
+            Td1(Te4((rk[1] >> 16) & 0xff) & 0xff) ^
+            Td2(Te4((rk[1] >>  8) & 0xff) & 0xff) ^
+            Td3(Te4((rk[1]) & 0xff)       & 0xff);
         rk[2] =
-            Td0[Te4[(rk[2] >> 24)       ] & 0xff] ^
-            Td1[Te4[(rk[2] >> 16) & 0xff] & 0xff] ^
-            Td2[Te4[(rk[2] >>  8) & 0xff] & 0xff] ^
-            Td3[Te4[(rk[2]) & 0xff]       & 0xff];
+            Td0(Te4((rk[2] >> 24)       ) & 0xff) ^
+            Td1(Te4((rk[2] >> 16) & 0xff) & 0xff) ^
+            Td2(Te4((rk[2] >>  8) & 0xff) & 0xff) ^
+            Td3(Te4((rk[2]) & 0xff)       & 0xff);
         rk[3] =
-            Td0[Te4[(rk[3] >> 24)       ] & 0xff] ^
-            Td1[Te4[(rk[3] >> 16) & 0xff] & 0xff] ^
-            Td2[Te4[(rk[3] >>  8) & 0xff] & 0xff] ^
-            Td3[Te4[(rk[3]) & 0xff]       & 0xff];
+            Td0(Te4((rk[3] >> 24)       ) & 0xff) ^
+            Td1(Te4((rk[3] >> 16) & 0xff) & 0xff) ^
+            Td2(Te4((rk[3] >>  8) & 0xff) & 0xff) ^
+            Td3(Te4((rk[3]) & 0xff)       & 0xff);
+#else
+        for (int k = 0; k < 4; k++) {
+            rk[k] =
+                Td0(Te4((rk[k] >> 24)       ) & 0xff) ^
+                Td1(Te4((rk[k] >> 16) & 0xff) & 0xff) ^
+                Td2(Te4((rk[k] >>  8) & 0xff) & 0xff) ^
+                Td3(Te4((rk[k]) & 0xff)       & 0xff);
+        }
+#endif
     }
 
     return 0;
@@ -951,9 +1030,9 @@ int aes_encrypt(const cipher_context_t *context, const uint8_t *plainBlock,
 
     const u32 *rk;
     u32 s0, s1, s2, s3, t0, t1, t2, t3;
-#ifndef FULL_UNROLL
+#ifndef MODULE_CRYPTO_AES_UNROLL
     int r;
-#endif /* ?FULL_UNROLL */
+#endif /* ?MODULE_CRYPTO_AES_UNROLL */
 
     rk = key->rd_key;
 
@@ -965,133 +1044,133 @@ int aes_encrypt(const cipher_context_t *context, const uint8_t *plainBlock,
     s1 = GETU32(plainBlock +  4) ^ rk[1];
     s2 = GETU32(plainBlock +  8) ^ rk[2];
     s3 = GETU32(plainBlock + 12) ^ rk[3];
-#ifdef FULL_UNROLL
+#ifdef MODULE_CRYPTO_AES_UNROLL
     /* round 1: */
-    t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >>  8) & 0xff] ^
-         Te3[s3 & 0xff] ^ rk[ 4];
-    t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >>  8) & 0xff] ^
-         Te3[s0 & 0xff] ^ rk[ 5];
-    t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >>  8) & 0xff] ^
-         Te3[s1 & 0xff] ^ rk[ 6];
-    t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >>  8) & 0xff] ^
-         Te3[s2 & 0xff] ^ rk[ 7];
+    t0 = Te0(s0 >> 24) ^ Te1((s1 >> 16) & 0xff) ^ Te2((s2 >>  8) & 0xff) ^
+         Te3(s3 & 0xff) ^ rk[ 4];
+    t1 = Te0(s1 >> 24) ^ Te1((s2 >> 16) & 0xff) ^ Te2((s3 >>  8) & 0xff) ^
+         Te3(s0 & 0xff) ^ rk[ 5];
+    t2 = Te0(s2 >> 24) ^ Te1((s3 >> 16) & 0xff) ^ Te2((s0 >>  8) & 0xff) ^
+         Te3(s1 & 0xff) ^ rk[ 6];
+    t3 = Te0(s3 >> 24) ^ Te1((s0 >> 16) & 0xff) ^ Te2((s1 >>  8) & 0xff) ^
+         Te3(s2 & 0xff) ^ rk[ 7];
     /* round 2: */
-    s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >>  8) & 0xff] ^
-         Te3[t3 & 0xff] ^ rk[ 8];
-    s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >>  8) & 0xff] ^
-         Te3[t0 & 0xff] ^ rk[ 9];
-    s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >>  8) & 0xff] ^
-         Te3[t1 & 0xff] ^ rk[10];
-    s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >>  8) & 0xff] ^
-         Te3[t2 & 0xff] ^ rk[11];
+    s0 = Te0(t0 >> 24) ^ Te1((t1 >> 16) & 0xff) ^ Te2((t2 >>  8) & 0xff) ^
+         Te3(t3 & 0xff) ^ rk[ 8];
+    s1 = Te0(t1 >> 24) ^ Te1((t2 >> 16) & 0xff) ^ Te2((t3 >>  8) & 0xff) ^
+         Te3(t0 & 0xff) ^ rk[ 9];
+    s2 = Te0(t2 >> 24) ^ Te1((t3 >> 16) & 0xff) ^ Te2((t0 >>  8) & 0xff) ^
+         Te3(t1 & 0xff) ^ rk[10];
+    s3 = Te0(t3 >> 24) ^ Te1((t0 >> 16) & 0xff) ^ Te2((t1 >>  8) & 0xff) ^
+         Te3(t2 & 0xff) ^ rk[11];
     /* round 3: */
-    t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >>  8) & 0xff] ^
-         Te3[s3 & 0xff] ^ rk[12];
-    t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >>  8) & 0xff] ^
-         Te3[s0 & 0xff] ^ rk[13];
-    t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >>  8) & 0xff] ^
-         Te3[s1 & 0xff] ^ rk[14];
-    t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >>  8) & 0xff] ^
-         Te3[s2 & 0xff] ^ rk[15];
+    t0 = Te0(s0 >> 24) ^ Te1((s1 >> 16) & 0xff) ^ Te2((s2 >>  8) & 0xff) ^
+         Te3(s3 & 0xff) ^ rk[12];
+    t1 = Te0(s1 >> 24) ^ Te1((s2 >> 16) & 0xff) ^ Te2((s3 >>  8) & 0xff) ^
+         Te3(s0 & 0xff) ^ rk[13];
+    t2 = Te0(s2 >> 24) ^ Te1((s3 >> 16) & 0xff) ^ Te2((s0 >>  8) & 0xff) ^
+         Te3(s1 & 0xff) ^ rk[14];
+    t3 = Te0(s3 >> 24) ^ Te1((s0 >> 16) & 0xff) ^ Te2((s1 >>  8) & 0xff) ^
+         Te3(s2 & 0xff) ^ rk[15];
     /* round 4: */
-    s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >>  8) & 0xff] ^
-         Te3[t3 & 0xff] ^ rk[16];
-    s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >>  8) & 0xff] ^
-         Te3[t0 & 0xff] ^ rk[17];
-    s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >>  8) & 0xff] ^
-         Te3[t1 & 0xff] ^ rk[18];
-    s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >>  8) & 0xff] ^
-         Te3[t2 & 0xff] ^ rk[19];
+    s0 = Te0(t0 >> 24) ^ Te1((t1 >> 16) & 0xff) ^ Te2((t2 >>  8) & 0xff) ^
+         Te3(t3 & 0xff) ^ rk[16];
+    s1 = Te0(t1 >> 24) ^ Te1((t2 >> 16) & 0xff) ^ Te2((t3 >>  8) & 0xff) ^
+         Te3(t0 & 0xff) ^ rk[17];
+    s2 = Te0(t2 >> 24) ^ Te1((t3 >> 16) & 0xff) ^ Te2((t0 >>  8) & 0xff) ^
+         Te3(t1 & 0xff) ^ rk[18];
+    s3 = Te0(t3 >> 24) ^ Te1((t0 >> 16) & 0xff) ^ Te2((t1 >>  8) & 0xff) ^
+         Te3(t2 & 0xff) ^ rk[19];
     /* round 5: */
-    t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >>  8) & 0xff] ^
-         Te3[s3 & 0xff] ^ rk[20];
-    t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >>  8) & 0xff] ^
-         Te3[s0 & 0xff] ^ rk[21];
-    t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >>  8) & 0xff] ^
-         Te3[s1 & 0xff] ^ rk[22];
-    t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >>  8) & 0xff] ^
-         Te3[s2 & 0xff] ^ rk[23];
+    t0 = Te0(s0 >> 24) ^ Te1((s1 >> 16) & 0xff) ^ Te2((s2 >>  8) & 0xff) ^
+         Te3(s3 & 0xff) ^ rk[20];
+    t1 = Te0(s1 >> 24) ^ Te1((s2 >> 16) & 0xff) ^ Te2((s3 >>  8) & 0xff) ^
+         Te3(s0 & 0xff) ^ rk[21];
+    t2 = Te0(s2 >> 24) ^ Te1((s3 >> 16) & 0xff) ^ Te2((s0 >>  8) & 0xff) ^
+         Te3(s1 & 0xff) ^ rk[22];
+    t3 = Te0(s3 >> 24) ^ Te1((s0 >> 16) & 0xff) ^ Te2((s1 >>  8) & 0xff) ^
+         Te3(s2 & 0xff) ^ rk[23];
     /* round 6: */
-    s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >>  8) & 0xff] ^
-         Te3[t3 & 0xff] ^ rk[24];
-    s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >>  8) & 0xff] ^
-         Te3[t0 & 0xff] ^ rk[25];
-    s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >>  8) & 0xff] ^
-         Te3[t1 & 0xff] ^ rk[26];
-    s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >>  8) & 0xff] ^
-         Te3[t2 & 0xff] ^ rk[27];
+    s0 = Te0(t0 >> 24) ^ Te1((t1 >> 16) & 0xff) ^ Te2((t2 >>  8) & 0xff) ^
+         Te3(t3 & 0xff) ^ rk[24];
+    s1 = Te0(t1 >> 24) ^ Te1((t2 >> 16) & 0xff) ^ Te2((t3 >>  8) & 0xff) ^
+         Te3(t0 & 0xff) ^ rk[25];
+    s2 = Te0(t2 >> 24) ^ Te1((t3 >> 16) & 0xff) ^ Te2((t0 >>  8) & 0xff) ^
+         Te3(t1 & 0xff) ^ rk[26];
+    s3 = Te0(t3 >> 24) ^ Te1((t0 >> 16) & 0xff) ^ Te2((t1 >>  8) & 0xff) ^
+         Te3(t2 & 0xff) ^ rk[27];
     /* round 7: */
-    t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >>  8) & 0xff] ^
-         Te3[s3 & 0xff] ^ rk[28];
-    t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >>  8) & 0xff] ^
-         Te3[s0 & 0xff] ^ rk[29];
-    t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >>  8) & 0xff] ^
-         Te3[s1 & 0xff] ^ rk[30];
-    t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >>  8) & 0xff] ^
-         Te3[s2 & 0xff] ^ rk[31];
+    t0 = Te0(s0 >> 24) ^ Te1((s1 >> 16) & 0xff) ^ Te2((s2 >>  8) & 0xff) ^
+         Te3(s3 & 0xff) ^ rk[28];
+    t1 = Te0(s1 >> 24) ^ Te1((s2 >> 16) & 0xff) ^ Te2((s3 >>  8) & 0xff) ^
+         Te3(s0 & 0xff) ^ rk[29];
+    t2 = Te0(s2 >> 24) ^ Te1((s3 >> 16) & 0xff) ^ Te2((s0 >>  8) & 0xff) ^
+         Te3(s1 & 0xff) ^ rk[30];
+    t3 = Te0(s3 >> 24) ^ Te1((s0 >> 16) & 0xff) ^ Te2((s1 >>  8) & 0xff) ^
+         Te3(s2 & 0xff) ^ rk[31];
     /* round 8: */
-    s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >>  8) & 0xff] ^
-         Te3[t3 & 0xff] ^ rk[32];
-    s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >>  8) & 0xff] ^
-         Te3[t0 & 0xff] ^ rk[33];
-    s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >>  8) & 0xff] ^
-         Te3[t1 & 0xff] ^ rk[34];
-    s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >>  8) & 0xff] ^
-         Te3[t2 & 0xff] ^ rk[35];
+    s0 = Te0(t0 >> 24) ^ Te1((t1 >> 16) & 0xff) ^ Te2((t2 >>  8) & 0xff) ^
+         Te3(t3 & 0xff) ^ rk[32];
+    s1 = Te0(t1 >> 24) ^ Te1((t2 >> 16) & 0xff) ^ Te2((t3 >>  8) & 0xff) ^
+         Te3(t0 & 0xff) ^ rk[33];
+    s2 = Te0(t2 >> 24) ^ Te1((t3 >> 16) & 0xff) ^ Te2((t0 >>  8) & 0xff) ^
+         Te3(t1 & 0xff) ^ rk[34];
+    s3 = Te0(t3 >> 24) ^ Te1((t0 >> 16) & 0xff) ^ Te2((t1 >>  8) & 0xff) ^
+         Te3(t2 & 0xff) ^ rk[35];
     /* round 9: */
-    t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >>  8) & 0xff] ^
-         Te3[s3 & 0xff] ^ rk[36];
-    t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >>  8) & 0xff] ^
-         Te3[s0 & 0xff] ^ rk[37];
-    t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >>  8) & 0xff] ^
-         Te3[s1 & 0xff] ^ rk[38];
-    t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >>  8) & 0xff] ^
-         Te3[s2 & 0xff] ^ rk[39];
+    t0 = Te0(s0 >> 24) ^ Te1((s1 >> 16) & 0xff) ^ Te2((s2 >>  8) & 0xff) ^
+         Te3(s3 & 0xff) ^ rk[36];
+    t1 = Te0(s1 >> 24) ^ Te1((s2 >> 16) & 0xff) ^ Te2((s3 >>  8) & 0xff) ^
+         Te3(s0 & 0xff) ^ rk[37];
+    t2 = Te0(s2 >> 24) ^ Te1((s3 >> 16) & 0xff) ^ Te2((s0 >>  8) & 0xff) ^
+         Te3(s1 & 0xff) ^ rk[38];
+    t3 = Te0(s3 >> 24) ^ Te1((s0 >> 16) & 0xff) ^ Te2((s1 >>  8) & 0xff) ^
+         Te3(s2 & 0xff) ^ rk[39];
 
     if (key->rounds > 10) {
         /* round 10: */
-        s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >>  8) & 0xff] ^
-             Te3[t3 & 0xff] ^ rk[40];
-        s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >>  8) & 0xff] ^
-             Te3[t0 & 0xff] ^ rk[41];
-        s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >>  8) & 0xff] ^
-             Te3[t1 & 0xff] ^ rk[42];
-        s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >>  8) & 0xff] ^
-             Te3[t2 & 0xff] ^ rk[43];
+        s0 = Te0(t0 >> 24) ^ Te1((t1 >> 16) & 0xff) ^ Te2((t2 >>  8) & 0xff) ^
+             Te3(t3 & 0xff) ^ rk[40];
+        s1 = Te0(t1 >> 24) ^ Te1((t2 >> 16) & 0xff) ^ Te2((t3 >>  8) & 0xff) ^
+             Te3(t0 & 0xff) ^ rk[41];
+        s2 = Te0(t2 >> 24) ^ Te1((t3 >> 16) & 0xff) ^ Te2((t0 >>  8) & 0xff) ^
+             Te3(t1 & 0xff) ^ rk[42];
+        s3 = Te0(t3 >> 24) ^ Te1((t0 >> 16) & 0xff) ^ Te2((t1 >>  8) & 0xff) ^
+             Te3(t2 & 0xff) ^ rk[43];
         /* round 11: */
-        t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >>  8) & 0xff] ^
-             Te3[s3 & 0xff] ^ rk[44];
-        t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >>  8) & 0xff] ^
-             Te3[s0 & 0xff] ^ rk[45];
-        t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >>  8) & 0xff] ^
-             Te3[s1 & 0xff] ^ rk[46];
-        t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >>  8) & 0xff] ^
-             Te3[s2 & 0xff] ^ rk[47];
+        t0 = Te0(s0 >> 24) ^ Te1((s1 >> 16) & 0xff) ^ Te2((s2 >>  8) & 0xff) ^
+             Te3(s3 & 0xff) ^ rk[44];
+        t1 = Te0(s1 >> 24) ^ Te1((s2 >> 16) & 0xff) ^ Te2((s3 >>  8) & 0xff) ^
+             Te3(s0 & 0xff) ^ rk[45];
+        t2 = Te0(s2 >> 24) ^ Te1((s3 >> 16) & 0xff) ^ Te2((s0 >>  8) & 0xff) ^
+             Te3(s1 & 0xff) ^ rk[46];
+        t3 = Te0(s3 >> 24) ^ Te1((s0 >> 16) & 0xff) ^ Te2((s1 >>  8) & 0xff) ^
+             Te3(s2 & 0xff) ^ rk[47];
 
         if (key->rounds > 12) {
             /* round 12: */
-            s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >>  8) &
-                    0xff] ^ Te3[t3 & 0xff] ^ rk[48];
-            s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >>  8) &
-                    0xff] ^ Te3[t0 & 0xff] ^ rk[49];
-            s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >>  8) &
-                    0xff] ^ Te3[t1 & 0xff] ^ rk[50];
-            s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >>  8) &
-                    0xff] ^ Te3[t2 & 0xff] ^ rk[51];
+            s0 = Te0(t0 >> 24) ^ Te1((t1 >> 16) & 0xff) ^ Te2((t2 >>  8) &
+                    0xff) ^ Te3(t3 & 0xff) ^ rk[48];
+            s1 = Te0(t1 >> 24) ^ Te1((t2 >> 16) & 0xff) ^ Te2((t3 >>  8) &
+                    0xff) ^ Te3(t0 & 0xff) ^ rk[49];
+            s2 = Te0(t2 >> 24) ^ Te1((t3 >> 16) & 0xff) ^ Te2((t0 >>  8) &
+                    0xff) ^ Te3(t1 & 0xff) ^ rk[50];
+            s3 = Te0(t3 >> 24) ^ Te1((t0 >> 16) & 0xff) ^ Te2((t1 >>  8) &
+                    0xff) ^ Te3(t2 & 0xff) ^ rk[51];
             /* round 13: */
-            t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >>  8) &
-                    0xff] ^ Te3[s3 & 0xff] ^ rk[52];
-            t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >>  8) &
-                    0xff] ^ Te3[s0 & 0xff] ^ rk[53];
-            t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >>  8) &
-                    0xff] ^ Te3[s1 & 0xff] ^ rk[54];
-            t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >>  8) &
-                    0xff] ^ Te3[s2 & 0xff] ^ rk[55];
+            t0 = Te0(s0 >> 24) ^ Te1((s1 >> 16) & 0xff) ^ Te2((s2 >>  8) &
+                    0xff) ^ Te3(s3 & 0xff) ^ rk[52];
+            t1 = Te0(s1 >> 24) ^ Te1((s2 >> 16) & 0xff) ^ Te2((s3 >>  8) &
+                    0xff) ^ Te3(s0 & 0xff) ^ rk[53];
+            t2 = Te0(s2 >> 24) ^ Te1((s3 >> 16) & 0xff) ^ Te2((s0 >>  8) &
+                    0xff) ^ Te3(s1 & 0xff) ^ rk[54];
+            t3 = Te0(s3 >> 24) ^ Te1((s0 >> 16) & 0xff) ^ Te2((s1 >>  8) &
+                    0xff) ^ Te3(s2 & 0xff) ^ rk[55];
         }
     }
 
     rk += key->rounds << 2;
-#else  /* !FULL_UNROLL */
+#else  /* !MODULE_CRYPTO_AES_UNROLL */
     /*
      * Nr - 1 full rounds:
      */
@@ -1099,28 +1178,28 @@ int aes_encrypt(const cipher_context_t *context, const uint8_t *plainBlock,
 
     while (1) {
         t0 =
-            Te0[(s0 >> 24)       ] ^
-            Te1[(s1 >> 16) & 0xff] ^
-            Te2[(s2 >>  8) & 0xff] ^
-            Te3[(s3)       & 0xff] ^
+            Te0((s0 >> 24)       ) ^
+            Te1((s1 >> 16) & 0xff) ^
+            Te2((s2 >>  8) & 0xff) ^
+            Te3((s3)       & 0xff) ^
             rk[4];
         t1 =
-            Te0[(s1 >> 24)       ] ^
-            Te1[(s2 >> 16) & 0xff] ^
-            Te2[(s3 >>  8) & 0xff] ^
-            Te3[(s0)       & 0xff] ^
+            Te0((s1 >> 24)       ) ^
+            Te1((s2 >> 16) & 0xff) ^
+            Te2((s3 >>  8) & 0xff) ^
+            Te3((s0)       & 0xff) ^
             rk[5];
         t2 =
-            Te0[(s2 >> 24)       ] ^
-            Te1[(s3 >> 16) & 0xff] ^
-            Te2[(s0 >>  8) & 0xff] ^
-            Te3[(s1)       & 0xff] ^
+            Te0((s2 >> 24)       ) ^
+            Te1((s3 >> 16) & 0xff) ^
+            Te2((s0 >>  8) & 0xff) ^
+            Te3((s1)       & 0xff) ^
             rk[6];
         t3 =
-            Te0[(s3 >> 24)       ] ^
-            Te1[(s0 >> 16) & 0xff] ^
-            Te2[(s1 >>  8) & 0xff] ^
-            Te3[(s2)       & 0xff] ^
+            Te0((s3 >> 24)       ) ^
+            Te1((s0 >> 16) & 0xff) ^
+            Te2((s1 >>  8) & 0xff) ^
+            Te3((s2)       & 0xff) ^
             rk[7];
 
         rk += 8;
@@ -1130,62 +1209,62 @@ int aes_encrypt(const cipher_context_t *context, const uint8_t *plainBlock,
         }
 
         s0 =
-            Te0[(t0 >> 24)       ] ^
-            Te1[(t1 >> 16) & 0xff] ^
-            Te2[(t2 >>  8) & 0xff] ^
-            Te3[(t3)       & 0xff] ^
+            Te0((t0 >> 24)       ) ^
+            Te1((t1 >> 16) & 0xff) ^
+            Te2((t2 >>  8) & 0xff) ^
+            Te3((t3)       & 0xff) ^
             rk[0];
         s1 =
-            Te0[(t1 >> 24)       ] ^
-            Te1[(t2 >> 16) & 0xff] ^
-            Te2[(t3 >>  8) & 0xff] ^
-            Te3[(t0)       & 0xff] ^
+            Te0((t1 >> 24)       ) ^
+            Te1((t2 >> 16) & 0xff) ^
+            Te2((t3 >>  8) & 0xff) ^
+            Te3((t0)       & 0xff) ^
             rk[1];
         s2 =
-            Te0[(t2 >> 24)       ] ^
-            Te1[(t3 >> 16) & 0xff] ^
-            Te2[(t0 >>  8) & 0xff] ^
-            Te3[(t1)       & 0xff] ^
+            Te0((t2 >> 24)       ) ^
+            Te1((t3 >> 16) & 0xff) ^
+            Te2((t0 >>  8) & 0xff) ^
+            Te3((t1)       & 0xff) ^
             rk[2];
         s3 =
-            Te0[(t3 >> 24)       ] ^
-            Te1[(t0 >> 16) & 0xff] ^
-            Te2[(t1 >>  8) & 0xff] ^
-            Te3[(t2)       & 0xff] ^
+            Te0((t3 >> 24)       ) ^
+            Te1((t0 >> 16) & 0xff) ^
+            Te2((t1 >>  8) & 0xff) ^
+            Te3((t2)       & 0xff) ^
             rk[3];
     }
 
-#endif /* ?FULL_UNROLL */
+#endif /* ?MODULE_CRYPTO_AES_UNROLL */
     /*
          * apply last round and
          * map cipher state to byte array block:
          */
     s0 =
-        (Te4[(t0 >> 24)       ] & 0xff000000) ^
-        (Te4[(t1 >> 16) & 0xff] & 0x00ff0000) ^
-        (Te4[(t2 >>  8) & 0xff] & 0x0000ff00) ^
-        (Te4[(t3) & 0xff]       & 0x000000ff) ^
+        (Te4((t0 >> 24)       ) & 0xff000000) ^
+        (Te4((t1 >> 16) & 0xff) & 0x00ff0000) ^
+        (Te4((t2 >>  8) & 0xff) & 0x0000ff00) ^
+        (Te4((t3) & 0xff)       & 0x000000ff) ^
         rk[0];
     PUTU32(cipherBlock     , s0);
     s1 =
-        (Te4[(t1 >> 24)       ] & 0xff000000) ^
-        (Te4[(t2 >> 16) & 0xff] & 0x00ff0000) ^
-        (Te4[(t3 >>  8) & 0xff] & 0x0000ff00) ^
-        (Te4[(t0) & 0xff]       & 0x000000ff) ^
+        (Te4((t1 >> 24)       ) & 0xff000000) ^
+        (Te4((t2 >> 16) & 0xff) & 0x00ff0000) ^
+        (Te4((t3 >>  8) & 0xff) & 0x0000ff00) ^
+        (Te4((t0) & 0xff)       & 0x000000ff) ^
         rk[1];
     PUTU32(cipherBlock +  4, s1);
     s2 =
-        (Te4[(t2 >> 24)       ] & 0xff000000) ^
-        (Te4[(t3 >> 16) & 0xff] & 0x00ff0000) ^
-        (Te4[(t0 >>  8) & 0xff] & 0x0000ff00) ^
-        (Te4[(t1) & 0xff]       & 0x000000ff) ^
+        (Te4((t2 >> 24)       ) & 0xff000000) ^
+        (Te4((t3 >> 16) & 0xff) & 0x00ff0000) ^
+        (Te4((t0 >>  8) & 0xff) & 0x0000ff00) ^
+        (Te4((t1) & 0xff)       & 0x000000ff) ^
         rk[2];
     PUTU32(cipherBlock +  8, s2);
     s3 =
-        (Te4[(t3 >> 24)       ] & 0xff000000) ^
-        (Te4[(t0 >> 16) & 0xff] & 0x00ff0000) ^
-        (Te4[(t1 >>  8) & 0xff] & 0x0000ff00) ^
-        (Te4[(t2) & 0xff]       & 0x000000ff) ^
+        (Te4((t3 >> 24)       ) & 0xff000000) ^
+        (Te4((t0 >> 16) & 0xff) & 0x00ff0000) ^
+        (Te4((t1 >>  8) & 0xff) & 0x0000ff00) ^
+        (Te4((t2) & 0xff)       & 0x000000ff) ^
         rk[3];
     PUTU32(cipherBlock + 12, s3);
     return 1;
@@ -1211,9 +1290,9 @@ int aes_decrypt(const cipher_context_t *context, const uint8_t *cipherBlock,
 
     const u32 *rk;
     u32 s0, s1, s2, s3, t0, t1, t2, t3;
-#ifndef FULL_UNROLL
+#ifndef MODULE_CRYPTO_AES_UNROLL
     int r;
-#endif /* ?FULL_UNROLL */
+#endif /* ?MODULE_CRYPTO_AES_UNROLL */
 
     rk = key->rd_key;
 
@@ -1225,133 +1304,133 @@ int aes_decrypt(const cipher_context_t *context, const uint8_t *cipherBlock,
     s1 = GETU32(cipherBlock +  4) ^ rk[1];
     s2 = GETU32(cipherBlock +  8) ^ rk[2];
     s3 = GETU32(cipherBlock + 12) ^ rk[3];
-#ifdef FULL_UNROLL
+#ifdef MODULE_CRYPTO_AES_UNROLL
     /* round 1: */
-    t0 = Td0[s0 >> 24] ^ Td1[(s3 >> 16) & 0xff] ^ Td2[(s2 >>  8) & 0xff] ^
-         Td3[s1 & 0xff] ^ rk[ 4];
-    t1 = Td0[s1 >> 24] ^ Td1[(s0 >> 16) & 0xff] ^ Td2[(s3 >>  8) & 0xff] ^
-         Td3[s2 & 0xff] ^ rk[ 5];
-    t2 = Td0[s2 >> 24] ^ Td1[(s1 >> 16) & 0xff] ^ Td2[(s0 >>  8) & 0xff] ^
-         Td3[s3 & 0xff] ^ rk[ 6];
-    t3 = Td0[s3 >> 24] ^ Td1[(s2 >> 16) & 0xff] ^ Td2[(s1 >>  8) & 0xff] ^
-         Td3[s0 & 0xff] ^ rk[ 7];
+    t0 = Td0(s0 >> 24) ^ Td1((s3 >> 16) & 0xff) ^ Td2((s2 >>  8) & 0xff) ^
+         Td3(s1 & 0xff) ^ rk[ 4];
+    t1 = Td0(s1 >> 24) ^ Td1((s0 >> 16) & 0xff) ^ Td2((s3 >>  8) & 0xff) ^
+         Td3(s2 & 0xff) ^ rk[ 5];
+    t2 = Td0(s2 >> 24) ^ Td1((s1 >> 16) & 0xff) ^ Td2((s0 >>  8) & 0xff) ^
+         Td3(s3 & 0xff) ^ rk[ 6];
+    t3 = Td0(s3 >> 24) ^ Td1((s2 >> 16) & 0xff) ^ Td2((s1 >>  8) & 0xff) ^
+         Td3(s0 & 0xff) ^ rk[ 7];
     /* round 2: */
-    s0 = Td0[t0 >> 24] ^ Td1[(t3 >> 16) & 0xff] ^ Td2[(t2 >>  8) & 0xff] ^
-         Td3[t1 & 0xff] ^ rk[ 8];
-    s1 = Td0[t1 >> 24] ^ Td1[(t0 >> 16) & 0xff] ^ Td2[(t3 >>  8) & 0xff] ^
-         Td3[t2 & 0xff] ^ rk[ 9];
-    s2 = Td0[t2 >> 24] ^ Td1[(t1 >> 16) & 0xff] ^ Td2[(t0 >>  8) & 0xff] ^
-         Td3[t3 & 0xff] ^ rk[10];
-    s3 = Td0[t3 >> 24] ^ Td1[(t2 >> 16) & 0xff] ^ Td2[(t1 >>  8) & 0xff] ^
-         Td3[t0 & 0xff] ^ rk[11];
+    s0 = Td0(t0 >> 24) ^ Td1((t3 >> 16) & 0xff) ^ Td2((t2 >>  8) & 0xff) ^
+         Td3(t1 & 0xff) ^ rk[ 8];
+    s1 = Td0(t1 >> 24) ^ Td1((t0 >> 16) & 0xff) ^ Td2((t3 >>  8) & 0xff) ^
+         Td3(t2 & 0xff) ^ rk[ 9];
+    s2 = Td0(t2 >> 24) ^ Td1((t1 >> 16) & 0xff) ^ Td2((t0 >>  8) & 0xff) ^
+         Td3(t3 & 0xff) ^ rk[10];
+    s3 = Td0(t3 >> 24) ^ Td1((t2 >> 16) & 0xff) ^ Td2((t1 >>  8) & 0xff) ^
+         Td3(t0 & 0xff) ^ rk[11];
     /* round 3: */
-    t0 = Td0[s0 >> 24] ^ Td1[(s3 >> 16) & 0xff] ^ Td2[(s2 >>  8) & 0xff] ^
-         Td3[s1 & 0xff] ^ rk[12];
-    t1 = Td0[s1 >> 24] ^ Td1[(s0 >> 16) & 0xff] ^ Td2[(s3 >>  8) & 0xff] ^
-         Td3[s2 & 0xff] ^ rk[13];
-    t2 = Td0[s2 >> 24] ^ Td1[(s1 >> 16) & 0xff] ^ Td2[(s0 >>  8) & 0xff] ^
-         Td3[s3 & 0xff] ^ rk[14];
-    t3 = Td0[s3 >> 24] ^ Td1[(s2 >> 16) & 0xff] ^ Td2[(s1 >>  8) & 0xff] ^
-         Td3[s0 & 0xff] ^ rk[15];
+    t0 = Td0(s0 >> 24) ^ Td1((s3 >> 16) & 0xff) ^ Td2((s2 >>  8) & 0xff) ^
+         Td3(s1 & 0xff) ^ rk[12];
+    t1 = Td0(s1 >> 24) ^ Td1((s0 >> 16) & 0xff) ^ Td2((s3 >>  8) & 0xff) ^
+         Td3(s2 & 0xff) ^ rk[13];
+    t2 = Td0(s2 >> 24) ^ Td1((s1 >> 16) & 0xff) ^ Td2((s0 >>  8) & 0xff) ^
+         Td3(s3 & 0xff) ^ rk[14];
+    t3 = Td0(s3 >> 24) ^ Td1((s2 >> 16) & 0xff) ^ Td2((s1 >>  8) & 0xff) ^
+         Td3(s0 & 0xff) ^ rk[15];
     /* round 4: */
-    s0 = Td0[t0 >> 24] ^ Td1[(t3 >> 16) & 0xff] ^ Td2[(t2 >>  8) & 0xff] ^
-         Td3[t1 & 0xff] ^ rk[16];
-    s1 = Td0[t1 >> 24] ^ Td1[(t0 >> 16) & 0xff] ^ Td2[(t3 >>  8) & 0xff] ^
-         Td3[t2 & 0xff] ^ rk[17];
-    s2 = Td0[t2 >> 24] ^ Td1[(t1 >> 16) & 0xff] ^ Td2[(t0 >>  8) & 0xff] ^
-         Td3[t3 & 0xff] ^ rk[18];
-    s3 = Td0[t3 >> 24] ^ Td1[(t2 >> 16) & 0xff] ^ Td2[(t1 >>  8) & 0xff] ^
-         Td3[t0 & 0xff] ^ rk[19];
+    s0 = Td0(t0 >> 24) ^ Td1((t3 >> 16) & 0xff) ^ Td2((t2 >>  8) & 0xff) ^
+         Td3(t1 & 0xff) ^ rk[16];
+    s1 = Td0(t1 >> 24) ^ Td1((t0 >> 16) & 0xff) ^ Td2((t3 >>  8) & 0xff) ^
+         Td3(t2 & 0xff) ^ rk[17];
+    s2 = Td0(t2 >> 24) ^ Td1((t1 >> 16) & 0xff) ^ Td2((t0 >>  8) & 0xff) ^
+         Td3(t3 & 0xff) ^ rk[18];
+    s3 = Td0(t3 >> 24) ^ Td1((t2 >> 16) & 0xff) ^ Td2((t1 >>  8) & 0xff) ^
+         Td3(t0 & 0xff) ^ rk[19];
     /* round 5: */
-    t0 = Td0[s0 >> 24] ^ Td1[(s3 >> 16) & 0xff] ^ Td2[(s2 >>  8) & 0xff] ^
-         Td3[s1 & 0xff] ^ rk[20];
-    t1 = Td0[s1 >> 24] ^ Td1[(s0 >> 16) & 0xff] ^ Td2[(s3 >>  8) & 0xff] ^
-         Td3[s2 & 0xff] ^ rk[21];
-    t2 = Td0[s2 >> 24] ^ Td1[(s1 >> 16) & 0xff] ^ Td2[(s0 >>  8) & 0xff] ^
-         Td3[s3 & 0xff] ^ rk[22];
-    t3 = Td0[s3 >> 24] ^ Td1[(s2 >> 16) & 0xff] ^ Td2[(s1 >>  8) & 0xff] ^
-         Td3[s0 & 0xff] ^ rk[23];
+    t0 = Td0(s0 >> 24) ^ Td1((s3 >> 16) & 0xff) ^ Td2((s2 >>  8) & 0xff) ^
+         Td3(s1 & 0xff) ^ rk[20];
+    t1 = Td0(s1 >> 24) ^ Td1((s0 >> 16) & 0xff) ^ Td2((s3 >>  8) & 0xff) ^
+         Td3(s2 & 0xff) ^ rk[21];
+    t2 = Td0(s2 >> 24) ^ Td1((s1 >> 16) & 0xff) ^ Td2((s0 >>  8) & 0xff) ^
+         Td3(s3 & 0xff) ^ rk[22];
+    t3 = Td0(s3 >> 24) ^ Td1((s2 >> 16) & 0xff) ^ Td2((s1 >>  8) & 0xff) ^
+         Td3(s0 & 0xff) ^ rk[23];
     /* round 6: */
-    s0 = Td0[t0 >> 24] ^ Td1[(t3 >> 16) & 0xff] ^ Td2[(t2 >>  8) & 0xff] ^
-         Td3[t1 & 0xff] ^ rk[24];
-    s1 = Td0[t1 >> 24] ^ Td1[(t0 >> 16) & 0xff] ^ Td2[(t3 >>  8) & 0xff] ^
-         Td3[t2 & 0xff] ^ rk[25];
-    s2 = Td0[t2 >> 24] ^ Td1[(t1 >> 16) & 0xff] ^ Td2[(t0 >>  8) & 0xff] ^
-         Td3[t3 & 0xff] ^ rk[26];
-    s3 = Td0[t3 >> 24] ^ Td1[(t2 >> 16) & 0xff] ^ Td2[(t1 >>  8) & 0xff] ^
-         Td3[t0 & 0xff] ^ rk[27];
+    s0 = Td0(t0 >> 24) ^ Td1((t3 >> 16) & 0xff) ^ Td2((t2 >>  8) & 0xff) ^
+         Td3(t1 & 0xff) ^ rk[24];
+    s1 = Td0(t1 >> 24) ^ Td1((t0 >> 16) & 0xff) ^ Td2((t3 >>  8) & 0xff) ^
+         Td3(t2 & 0xff) ^ rk[25];
+    s2 = Td0(t2 >> 24) ^ Td1((t1 >> 16) & 0xff) ^ Td2((t0 >>  8) & 0xff) ^
+         Td3(t3 & 0xff) ^ rk[26];
+    s3 = Td0(t3 >> 24) ^ Td1((t2 >> 16) & 0xff) ^ Td2((t1 >>  8) & 0xff) ^
+         Td3(t0 & 0xff) ^ rk[27];
     /* round 7: */
-    t0 = Td0[s0 >> 24] ^ Td1[(s3 >> 16) & 0xff] ^ Td2[(s2 >>  8) & 0xff] ^
-         Td3[s1 & 0xff] ^ rk[28];
-    t1 = Td0[s1 >> 24] ^ Td1[(s0 >> 16) & 0xff] ^ Td2[(s3 >>  8) & 0xff] ^
-         Td3[s2 & 0xff] ^ rk[29];
-    t2 = Td0[s2 >> 24] ^ Td1[(s1 >> 16) & 0xff] ^ Td2[(s0 >>  8) & 0xff] ^
-         Td3[s3 & 0xff] ^ rk[30];
-    t3 = Td0[s3 >> 24] ^ Td1[(s2 >> 16) & 0xff] ^ Td2[(s1 >>  8) & 0xff] ^
-         Td3[s0 & 0xff] ^ rk[31];
+    t0 = Td0(s0 >> 24) ^ Td1((s3 >> 16) & 0xff) ^ Td2((s2 >>  8) & 0xff) ^
+         Td3(s1 & 0xff) ^ rk[28];
+    t1 = Td0(s1 >> 24) ^ Td1((s0 >> 16) & 0xff) ^ Td2((s3 >>  8) & 0xff) ^
+         Td3(s2 & 0xff) ^ rk[29];
+    t2 = Td0(s2 >> 24) ^ Td1((s1 >> 16) & 0xff) ^ Td2((s0 >>  8) & 0xff) ^
+         Td3(s3 & 0xff) ^ rk[30];
+    t3 = Td0(s3 >> 24) ^ Td1((s2 >> 16) & 0xff) ^ Td2((s1 >>  8) & 0xff) ^
+         Td3(s0 & 0xff) ^ rk[31];
     /* round 8: */
-    s0 = Td0[t0 >> 24] ^ Td1[(t3 >> 16) & 0xff] ^ Td2[(t2 >>  8) & 0xff] ^
-         Td3[t1 & 0xff] ^ rk[32];
-    s1 = Td0[t1 >> 24] ^ Td1[(t0 >> 16) & 0xff] ^ Td2[(t3 >>  8) & 0xff] ^
-         Td3[t2 & 0xff] ^ rk[33];
-    s2 = Td0[t2 >> 24] ^ Td1[(t1 >> 16) & 0xff] ^ Td2[(t0 >>  8) & 0xff] ^
-         Td3[t3 & 0xff] ^ rk[34];
-    s3 = Td0[t3 >> 24] ^ Td1[(t2 >> 16) & 0xff] ^ Td2[(t1 >>  8) & 0xff] ^
-         Td3[t0 & 0xff] ^ rk[35];
+    s0 = Td0(t0 >> 24) ^ Td1((t3 >> 16) & 0xff) ^ Td2((t2 >>  8) & 0xff) ^
+         Td3(t1 & 0xff) ^ rk[32];
+    s1 = Td0(t1 >> 24) ^ Td1((t0 >> 16) & 0xff) ^ Td2((t3 >>  8) & 0xff) ^
+         Td3(t2 & 0xff) ^ rk[33];
+    s2 = Td0(t2 >> 24) ^ Td1((t1 >> 16) & 0xff) ^ Td2((t0 >>  8) & 0xff) ^
+         Td3(t3 & 0xff) ^ rk[34];
+    s3 = Td0(t3 >> 24) ^ Td1((t2 >> 16) & 0xff) ^ Td2((t1 >>  8) & 0xff) ^
+         Td3(t0 & 0xff) ^ rk[35];
     /* round 9: */
-    t0 = Td0[s0 >> 24] ^ Td1[(s3 >> 16) & 0xff] ^ Td2[(s2 >>  8) & 0xff] ^
-         Td3[s1 & 0xff] ^ rk[36];
-    t1 = Td0[s1 >> 24] ^ Td1[(s0 >> 16) & 0xff] ^ Td2[(s3 >>  8) & 0xff] ^
-         Td3[s2 & 0xff] ^ rk[37];
-    t2 = Td0[s2 >> 24] ^ Td1[(s1 >> 16) & 0xff] ^ Td2[(s0 >>  8) & 0xff] ^
-         Td3[s3 & 0xff] ^ rk[38];
-    t3 = Td0[s3 >> 24] ^ Td1[(s2 >> 16) & 0xff] ^ Td2[(s1 >>  8) & 0xff] ^
-         Td3[s0 & 0xff] ^ rk[39];
+    t0 = Td0(s0 >> 24) ^ Td1((s3 >> 16) & 0xff) ^ Td2((s2 >>  8) & 0xff) ^
+         Td3(s1 & 0xff) ^ rk[36];
+    t1 = Td0(s1 >> 24) ^ Td1((s0 >> 16) & 0xff) ^ Td2((s3 >>  8) & 0xff) ^
+         Td3(s2 & 0xff) ^ rk[37];
+    t2 = Td0(s2 >> 24) ^ Td1((s1 >> 16) & 0xff) ^ Td2((s0 >>  8) & 0xff) ^
+         Td3(s3 & 0xff) ^ rk[38];
+    t3 = Td0(s3 >> 24) ^ Td1((s2 >> 16) & 0xff) ^ Td2((s1 >>  8) & 0xff) ^
+         Td3(s0 & 0xff) ^ rk[39];
 
     if (key->rounds > 10) {
         /* round 10: */
-        s0 = Td0[t0 >> 24] ^ Td1[(t3 >> 16) & 0xff] ^ Td2[(t2 >>  8) & 0xff] ^
-             Td3[t1 & 0xff] ^ rk[40];
-        s1 = Td0[t1 >> 24] ^ Td1[(t0 >> 16) & 0xff] ^ Td2[(t3 >>  8) & 0xff] ^
-             Td3[t2 & 0xff] ^ rk[41];
-        s2 = Td0[t2 >> 24] ^ Td1[(t1 >> 16) & 0xff] ^ Td2[(t0 >>  8) & 0xff] ^
-             Td3[t3 & 0xff] ^ rk[42];
-        s3 = Td0[t3 >> 24] ^ Td1[(t2 >> 16) & 0xff] ^ Td2[(t1 >>  8) & 0xff] ^
-             Td3[t0 & 0xff] ^ rk[43];
+        s0 = Td0(t0 >> 24) ^ Td1((t3 >> 16) & 0xff) ^ Td2((t2 >>  8) & 0xff) ^
+             Td3(t1 & 0xff) ^ rk[40];
+        s1 = Td0(t1 >> 24) ^ Td1((t0 >> 16) & 0xff) ^ Td2((t3 >>  8) & 0xff) ^
+             Td3(t2 & 0xff) ^ rk[41];
+        s2 = Td0(t2 >> 24) ^ Td1((t1 >> 16) & 0xff) ^ Td2((t0 >>  8) & 0xff) ^
+             Td3(t3 & 0xff) ^ rk[42];
+        s3 = Td0(t3 >> 24) ^ Td1((t2 >> 16) & 0xff) ^ Td2((t1 >>  8) & 0xff) ^
+             Td3(t0 & 0xff) ^ rk[43];
         /* round 11: */
-        t0 = Td0[s0 >> 24] ^ Td1[(s3 >> 16) & 0xff] ^ Td2[(s2 >>  8) & 0xff] ^
-             Td3[s1 & 0xff] ^ rk[44];
-        t1 = Td0[s1 >> 24] ^ Td1[(s0 >> 16) & 0xff] ^ Td2[(s3 >>  8) & 0xff] ^
-             Td3[s2 & 0xff] ^ rk[45];
-        t2 = Td0[s2 >> 24] ^ Td1[(s1 >> 16) & 0xff] ^ Td2[(s0 >>  8) & 0xff] ^
-             Td3[s3 & 0xff] ^ rk[46];
-        t3 = Td0[s3 >> 24] ^ Td1[(s2 >> 16) & 0xff] ^ Td2[(s1 >>  8) & 0xff] ^
-             Td3[s0 & 0xff] ^ rk[47];
+        t0 = Td0(s0 >> 24) ^ Td1((s3 >> 16) & 0xff) ^ Td2((s2 >>  8) & 0xff) ^
+             Td3(s1 & 0xff) ^ rk[44];
+        t1 = Td0(s1 >> 24) ^ Td1((s0 >> 16) & 0xff) ^ Td2((s3 >>  8) & 0xff) ^
+             Td3(s2 & 0xff) ^ rk[45];
+        t2 = Td0(s2 >> 24) ^ Td1((s1 >> 16) & 0xff) ^ Td2((s0 >>  8) & 0xff) ^
+             Td3(s3 & 0xff) ^ rk[46];
+        t3 = Td0(s3 >> 24) ^ Td1((s2 >> 16) & 0xff) ^ Td2((s1 >>  8) & 0xff) ^
+             Td3(s0 & 0xff) ^ rk[47];
 
         if (key->rounds > 12) {
             /* round 12: */
-            s0 = Td0[t0 >> 24] ^ Td1[(t3 >> 16) & 0xff] ^ Td2[(t2 >>  8) & 0xff]
-                 ^ Td3[t1 & 0xff] ^ rk[48];
-            s1 = Td0[t1 >> 24] ^ Td1[(t0 >> 16) & 0xff] ^ Td2[(t3 >>  8) & 0xff]
-                 ^ Td3[t2 & 0xff] ^ rk[49];
-            s2 = Td0[t2 >> 24] ^ Td1[(t1 >> 16) & 0xff] ^ Td2[(t0 >>  8) & 0xff]
-                 ^ Td3[t3 & 0xff] ^ rk[50];
-            s3 = Td0[t3 >> 24] ^ Td1[(t2 >> 16) & 0xff] ^ Td2[(t1 >>  8) & 0xff]
-                 ^ Td3[t0 & 0xff] ^ rk[51];
+            s0 = Td0(t0 >> 24) ^ Td1((t3 >> 16) & 0xff) ^ Td2((t2 >>  8) & 0xff)
+                 ^ Td3(t1 & 0xff) ^ rk[48];
+            s1 = Td0(t1 >> 24) ^ Td1((t0 >> 16) & 0xff) ^ Td2((t3 >>  8) & 0xff)
+                 ^ Td3(t2 & 0xff) ^ rk[49];
+            s2 = Td0(t2 >> 24) ^ Td1((t1 >> 16) & 0xff) ^ Td2((t0 >>  8) & 0xff)
+                 ^ Td3(t3 & 0xff) ^ rk[50];
+            s3 = Td0(t3 >> 24) ^ Td1((t2 >> 16) & 0xff) ^ Td2((t1 >>  8) & 0xff)
+                 ^ Td3(t0 & 0xff) ^ rk[51];
             /* round 13: */
-            t0 = Td0[s0 >> 24] ^ Td1[(s3 >> 16) & 0xff] ^ Td2[(s2 >>  8) & 0xff]
-                 ^ Td3[s1 & 0xff] ^ rk[52];
-            t1 = Td0[s1 >> 24] ^ Td1[(s0 >> 16) & 0xff] ^ Td2[(s3 >>  8) & 0xff]
-                 ^ Td3[s2 & 0xff] ^ rk[53];
-            t2 = Td0[s2 >> 24] ^ Td1[(s1 >> 16) & 0xff] ^ Td2[(s0 >>  8) & 0xff]
-                 ^ Td3[s3 & 0xff] ^ rk[54];
-            t3 = Td0[s3 >> 24] ^ Td1[(s2 >> 16) & 0xff] ^ Td2[(s1 >>  8) & 0xff]
-                 ^ Td3[s0 & 0xff] ^ rk[55];
+            t0 = Td0(s0 >> 24) ^ Td1((s3 >> 16) & 0xff) ^ Td2((s2 >>  8) & 0xff)
+                 ^ Td3(s1 & 0xff) ^ rk[52];
+            t1 = Td0(s1 >> 24) ^ Td1((s0 >> 16) & 0xff) ^ Td2((s3 >>  8) & 0xff)
+                 ^ Td3(s2 & 0xff) ^ rk[53];
+            t2 = Td0(s2 >> 24) ^ Td1((s1 >> 16) & 0xff) ^ Td2((s0 >>  8) & 0xff)
+                 ^ Td3(s3 & 0xff) ^ rk[54];
+            t3 = Td0(s3 >> 24) ^ Td1((s2 >> 16) & 0xff) ^ Td2((s1 >>  8) & 0xff)
+                 ^ Td3(s0 & 0xff) ^ rk[55];
         }
     }
 
     rk += key->rounds << 2;
-#else  /* !FULL_UNROLL */
+#else  /* !MODULE_CRYPTO_AES_UNROLL */
     /*
      * Nr - 1 full rounds:
      */
@@ -1359,28 +1438,28 @@ int aes_decrypt(const cipher_context_t *context, const uint8_t *cipherBlock,
 
     while (1) {
         t0 =
-            Td0[(s0 >> 24)       ] ^
-            Td1[(s3 >> 16) & 0xff] ^
-            Td2[(s2 >>  8) & 0xff] ^
-            Td3[(s1)       & 0xff] ^
+            Td0((s0 >> 24)       ) ^
+            Td1((s3 >> 16) & 0xff) ^
+            Td2((s2 >>  8) & 0xff) ^
+            Td3((s1)       & 0xff) ^
             rk[4];
         t1 =
-            Td0[(s1 >> 24)       ] ^
-            Td1[(s0 >> 16) & 0xff] ^
-            Td2[(s3 >>  8) & 0xff] ^
-            Td3[(s2)       & 0xff] ^
+            Td0((s1 >> 24)       ) ^
+            Td1((s0 >> 16) & 0xff) ^
+            Td2((s3 >>  8) & 0xff) ^
+            Td3((s2)       & 0xff) ^
             rk[5];
         t2 =
-            Td0[(s2 >> 24)       ] ^
-            Td1[(s1 >> 16) & 0xff] ^
-            Td2[(s0 >>  8) & 0xff] ^
-            Td3[(s3)       & 0xff] ^
+            Td0((s2 >> 24)       ) ^
+            Td1((s1 >> 16) & 0xff) ^
+            Td2((s0 >>  8) & 0xff) ^
+            Td3((s3)       & 0xff) ^
             rk[6];
         t3 =
-            Td0[(s3 >> 24)       ] ^
-            Td1[(s2 >> 16) & 0xff] ^
-            Td2[(s1 >>  8) & 0xff] ^
-            Td3[(s0)       & 0xff] ^
+            Td0((s3 >> 24)       ) ^
+            Td1((s2 >> 16) & 0xff) ^
+            Td2((s1 >>  8) & 0xff) ^
+            Td3((s0)       & 0xff) ^
             rk[7];
 
         rk += 8;
@@ -1390,62 +1469,62 @@ int aes_decrypt(const cipher_context_t *context, const uint8_t *cipherBlock,
         }
 
         s0 =
-            Td0[(t0 >> 24)       ] ^
-            Td1[(t3 >> 16) & 0xff] ^
-            Td2[(t2 >>  8) & 0xff] ^
-            Td3[(t1)       & 0xff] ^
+            Td0((t0 >> 24)       ) ^
+            Td1((t3 >> 16) & 0xff) ^
+            Td2((t2 >>  8) & 0xff) ^
+            Td3((t1)       & 0xff) ^
             rk[0];
         s1 =
-            Td0[(t1 >> 24)       ] ^
-            Td1[(t0 >> 16) & 0xff] ^
-            Td2[(t3 >>  8) & 0xff] ^
-            Td3[(t2) & 0xff] ^
+            Td0((t1 >> 24)       ) ^
+            Td1((t0 >> 16) & 0xff) ^
+            Td2((t3 >>  8) & 0xff) ^
+            Td3((t2) & 0xff) ^
             rk[1];
         s2 =
-            Td0[(t2 >> 24)       ] ^
-            Td1[(t1 >> 16) & 0xff] ^
-            Td2[(t0 >>  8) & 0xff] ^
-            Td3[(t3)       & 0xff] ^
+            Td0((t2 >> 24)       ) ^
+            Td1((t1 >> 16) & 0xff) ^
+            Td2((t0 >>  8) & 0xff) ^
+            Td3((t3)       & 0xff) ^
             rk[2];
         s3 =
-            Td0[(t3 >> 24)       ] ^
-            Td1[(t2 >> 16) & 0xff] ^
-            Td2[(t1 >>  8) & 0xff] ^
-            Td3[(t0)       & 0xff] ^
+            Td0((t3 >> 24)       ) ^
+            Td1((t2 >> 16) & 0xff) ^
+            Td2((t1 >>  8) & 0xff) ^
+            Td3((t0)       & 0xff) ^
             rk[3];
     }
 
-#endif /* ?FULL_UNROLL */
+#endif /* ?MODULE_CRYPTO_AES_UNROLL */
     /*
          * apply last round and
          * map cipher state to byte array block:
          */
     s0 =
-        (Td4[(t0 >> 24)       ] & 0xff000000) ^
-        (Td4[(t3 >> 16) & 0xff] & 0x00ff0000) ^
-        (Td4[(t2 >>  8) & 0xff] & 0x0000ff00) ^
-        (Td4[(t1) & 0xff]       & 0x000000ff) ^
+        (Td4((t0 >> 24)       ) & 0xff000000) ^
+        (Td4((t3 >> 16) & 0xff) & 0x00ff0000) ^
+        (Td4((t2 >>  8) & 0xff) & 0x0000ff00) ^
+        (Td4((t1) & 0xff)       & 0x000000ff) ^
         rk[0];
     PUTU32(plainBlock     , s0);
     s1 =
-        (Td4[(t1 >> 24)       ] & 0xff000000) ^
-        (Td4[(t0 >> 16) & 0xff] & 0x00ff0000) ^
-        (Td4[(t3 >>  8) & 0xff] & 0x0000ff00) ^
-        (Td4[(t2) & 0xff]       & 0x000000ff) ^
+        (Td4((t1 >> 24)       ) & 0xff000000) ^
+        (Td4((t0 >> 16) & 0xff) & 0x00ff0000) ^
+        (Td4((t3 >>  8) & 0xff) & 0x0000ff00) ^
+        (Td4((t2) & 0xff)       & 0x000000ff) ^
         rk[1];
     PUTU32(plainBlock +  4, s1);
     s2 =
-        (Td4[(t2 >> 24)       ] & 0xff000000) ^
-        (Td4[(t1 >> 16) & 0xff] & 0x00ff0000) ^
-        (Td4[(t0 >>  8) & 0xff] & 0x0000ff00) ^
-        (Td4[(t3) & 0xff]       & 0x000000ff) ^
+        (Td4((t2 >> 24)       ) & 0xff000000) ^
+        (Td4((t1 >> 16) & 0xff) & 0x00ff0000) ^
+        (Td4((t0 >>  8) & 0xff) & 0x0000ff00) ^
+        (Td4((t3) & 0xff)       & 0x000000ff) ^
         rk[2];
     PUTU32(plainBlock +  8, s2);
     s3 =
-        (Td4[(t3 >> 24)       ] & 0xff000000) ^
-        (Td4[(t2 >> 16) & 0xff] & 0x00ff0000) ^
-        (Td4[(t1 >>  8) & 0xff] & 0x0000ff00) ^
-        (Td4[(t0) & 0xff]       & 0x000000ff) ^
+        (Td4((t3 >> 24)       ) & 0xff000000) ^
+        (Td4((t2 >> 16) & 0xff) & 0x00ff0000) ^
+        (Td4((t1 >>  8) & 0xff) & 0x0000ff00) ^
+        (Td4((t0) & 0xff)       & 0x000000ff) ^
         rk[3];
     PUTU32(plainBlock + 12, s3);
     return 1;
diff --git a/sys/crypto/doc.txt b/sys/crypto/doc.txt
index d2caee80cfef0b0b84d0d945b4f808288f472b14..707e238827119eaca5dd5acc521ba956d4cf530b 100644
--- a/sys/crypto/doc.txt
+++ b/sys/crypto/doc.txt
@@ -47,6 +47,13 @@
  *
  * @endcode
  *
+ * Some aspects of the AES implementation can be fine tuned by pseudo-modules:
+ *  * crypto_aes_precalculated: Use pre-calculated T-tables. This improved
+ *       speed at the expense of increased program size. The default is to
+ *       calculate most tables on the fly.
+ *  * crypto_aes_unroll: enable manually-unrolled loops. The default is to not
+ *       have them unrolled.
+ *
  * If you need to encrypt data of arbitrary size take a look at the different
  * operation modes like: CBC, CTR or CCM.
  *
diff --git a/sys/include/crypto/aes.h b/sys/include/crypto/aes.h
index 6a897348684df81fa12a300240d55e6a463d833c..b8756b10ceb46b8662b60a48bfbbf7e0d9f3c17c 100644
--- a/sys/include/crypto/aes.h
+++ b/sys/include/crypto/aes.h
@@ -37,9 +37,6 @@ typedef uint32_t u32;
 typedef uint16_t u16;
 typedef uint8_t u8;
 
-
-/* This controls loop-unrolling in aes_core.c */
-#undef FULL_UNROLL
 # define GETU32(pt) (((u32)(pt)[0] << 24) ^ ((u32)(pt)[1] << 16) ^ \
                      ((u32)(pt)[2] <<  8) ^ ((u32)(pt)[3]))
 # define PUTU32(ct, st) { (ct)[0] = (u8)((st) >> 24); \