نتایج جستجو برای: advanced encryption standard

تعداد نتایج: 772288  

1999
Helena Handschuh Serge Vaudenay

DES and triple-DES are two well-known and popular encryption algorithms, but they both have the same drawback: their block size is limited to 64 bits. While the cryptographic community is working hard to select and evaluate candidates and finalists for the AES (Advanced Encryption Standard) contest launched by NIST in 1997, it might be of interest to propose a secure and simple double block-len...

2001
Ingrid Verbauwhede Patrick Schaumont Henry Kuo

This contribution describes the design and performance testing of an Advanced Encryption Standard (AES) compliant encryption chip that delivers 2.29 GB/s of encryption throughput at 56 mW of power consumption in a 0.18m CMOS standard cell technology. This integrated circuit implements the Rijndael encryption algorithm, at any combination of block lengths (128, 192, or 25 bits) and key lengths (...

2010
G. Ramesh R. Umarani

Abstract Hacking is one of the greatest problems in the wireless local area networks. Many algorithms have been used to prevent the outside attacks to eavesdrop or prevent the data to be transferred to the end-user safely and correctly. In this paper, a new symmetrical encryption algorithm is proposed that prevents the outside attacks. The new algorithm avoids key exchange between users and red...

2008
Mostafa I. Soliman Ghada Y. Abozaid

Advanced Encryption Standard (AES) was issued as FIPS by NIST as a successor to data encryption standard (DES) algorithms. The applications of the AES are wide including any sensitive data requires cryptographic protection before communication or storage. Thus, many students are interested in learning how the AES is working. One of the inherent limitations of traditional methods for explaining/...

2004
Carlos Cid

Since being officially selected as the new Advanced Encryption Standard (AES), Rijndael has continued to receive great attention and has had its security continuously evaluated by the cryptographic

Journal: :RFC 2002
Pete Chown

Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security (TLS) Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol...

2012
Juan Soto

One of the criteria used to evaluate the Advanced Encryption Standard candidate algorithms was their demonstrated suitability as random number generators. That is, the evaluation of their output utilizing statistical tests should not provide any means by which to computationally distinguish them from a truly random source. This internal report lists several characteristics which an encryption a...

2009
S. S. Naqvi S. R. Naqvi S. A Khan S. A. Malik

The work presented proposes two diverse FPGA based architectures with high-speed and low area constraints for suitable implementation of Advanced Encryption Standard (AES). The main focus of this paper is to compare different design architectures existing in literature with the proposed ones, based on application specific constraints. The high speed design presented here proposes a good enginee...

2001
James Nechvatal Elaine Barker Lawrence Bassham William Burr Morris Dworkin James Foti Edward Roback

In 1997, the National Institute of Standards and Technology (NIST) initiated a process to select a symmetric-key encryption algorithm to be used to protect sensitive (unclassified) Federal information in furtherance of NIST's statutory responsibilities. In 1998, NIST announced the acceptance of 15 candidate algorithms and requested the assistance of the cryptographic research community in analy...

2014
Xiaofei Guo Debdeep Mukhopadhyay Ramesh Karri

Differential fault analysis (DFA) poses a significant threat to Advanced Encryption Standard (AES). Only a single faulty ciphertext is required for contemporary DFA to extract the secret key of AES using an average of 2 computations. Concurrent error detection (CED) is widely used to protect AES against DFA. Traditionally, these CEDs are evaluated with uniformly distributed faults, and the resu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید