Some Techniques to Compute Multiplicative Inverses for Advanced Encryption Standard

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

FPGA Can be Implemented Using Advanced Encryption Standard Algorithm

This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and...

متن کامل

A Review of Some Popular Hardware Implementation Techniques Implemented on Advanced Encryption Standard

This review Research paper concentrates on the different kinds of hardware implementation techniques that are exist. It also frames all the hardware implementation techniques together as a literature survey. The main Aim is the practical study of hardware implementation Techniques on Advanced Encryption Standard with the basis of various available encryption methods. Also it focuses on Throughp...

متن کامل

Advanced Encryption Standard

The Advanced Encryption Standard (AES), which implements the Rijndael cipher, is a symmetric block cipher that was developed as a result of a call by the United States National Institute of Standards and Technology in 1997 for a secure cryptosystem to replace the then standard Data Encryption Standard algorithm, which had become vulnerable to brute-force attacks. Among several proposals, the Ri...

متن کامل

Some Algebraic Aspects of the Advanced Encryption Standard

Since being officially selected as the new Advanced Encryption Standard (AES), Rijndael has continued to receive great attention and has had its security continuously evaluated by the cryptographic

متن کامل

fpga can be implemented using advanced encryption standard algorithm

this paper mainly focused on implementation of aes encryption and decryption standard aes-128. all the transformations of both encryption and decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. this method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theaes inversesub bytes module and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: JOURNAL OF ADVANCES IN MATHEMATICS

سال: 2019

ISSN: 2347-1921

DOI: 10.24297/jam.v16i0.8016