نتایج جستجو برای: advanced encryption standard
تعداد نتایج: 772288 فیلتر نتایج به سال:
The data surge caused by the increase in use of IoT devices our day-to-day activities requires careful storage and maintenance systems to ensure protection integrity private information. Users are provided with prospects rule-based programs services that can be interconnected their thereby enabling automation prodigious ecosystem. sensitive is generally stored processed cloud services. This may...
The Advanced Encryption Standard or better known as the AES Algorithm is a standard algorithm and has been widely used an application of cryptography. Currently, lot research developing about attacks on algorithm. Therefore, there have many studies related to modifications with aim increasing security produce alternatives encryption algorithms that can be secure data. In this study, were made b...
A software defined radio (SDR) is a radio transmitter/receiver that uses reconfigurable hardware and software for encoding/decoding, modulation/demodulation, and encrypting/decrypting. This allows much more power and flexibility when designing any radio system. The AES algorithm is a block cipher that can encrypt and decrypt digital information. The AES algorithm is capable of using cryptograph...
The Advanced Encryption Standard (AES) was widely accepted as the de facto standard in many securityrelated fields such as Embedded Development, Information Management, and Network Communication etc. In this paper, we firstly study the theory of AES algorithm and then conduct performance analysis of AES algorithm on MPC processor whose frequency is 800MHz according to the superscalar pipeline o...
The Advanced Encryption Standard selection process has, for the first time, included software execution speed as a relevant criterion for the choice of the next standard. The initial submissions included keying, encryption, and decryption execution times, in clock cycles, for Intel Pentium, Pentium II, and Pentium Pro microprocessors. While Pentium execution speeds are important, by no means do...
This document describes a symmetric encryption protocol that supplements the protocols described in the User-based Security Model (USM), which is a Security Subsystem for version 3 of the Simple Network Management Protocol for use in the SNMP Architecture. The symmetric encryption protocol described in this document is based on the Advanced Encryption Standard (AES) cipher algorithm used in Cip...
This document describes a symmetric encryption protocol that supplements the protocols described in the User-based Security Model (USM), which is a Security Subsystem for version 3 of the Simple Network Management Protocol for use in the SNMP Architecture. The symmetric encryption protocol described in this document is based on the Advanced Encryption Standard (AES) cipher algorithm used in Cip...
Fault-based side channel cryptanalysis is very effective against symmetric and asymmetric encryption algorithms. Although straightforward hardware and time redundancy based concurrent error detection (CED) architectures can be used to thwart such attacks, they entail significant overhead (either area or performance). In this paper we investigate two systematic approaches to low-cost, low-latenc...
Fault-based side-channel cryptanalysis is very effective against symmetric and asymmetric encryption algorithms. Although straightforward hardware and time redundancy-based concurrent error detection (CED) architectures can be used to thwart such attacks, they entail significant overheads (either area or performance). The authors investigate systematic approaches to low-cost low-latency CED tec...
This memo describes the use of the Advanced Encryption Standard (AES) with 192and 256-bit keys within the Secure RTP (SRTP) protocol. It details counter mode encryption for SRTP and Secure Realtime Transport Control Protocol (SRTCP) and a new SRTP Key Derivation Function (KDF) for AES-192 and AES-256.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید