نتایج جستجو برای: advanced encryption standard

تعداد نتایج: 772288  

Journal: :Journal of Information Technology and Digital World 2022

The data surge caused by the increase in use of IoT devices our day-to-day activities requires careful storage and maintenance systems to ensure protection integrity private information. Users are provided with prospects rule-based programs services that can be interconnected their thereby enabling automation prodigious ecosystem. sensitive is generally stored processed cloud services. This may...

Journal: :Jurnal Teknik Informatika 2022

The Advanced Encryption Standard or better known as the AES Algorithm is a standard algorithm and has been widely used an application of cryptography. Currently, lot research developing about attacks on algorithm. Therefore, there have many studies related to modifications with aim increasing security produce alternatives encryption algorithms that can be secure data. In this study, were made b...

2015
Sharanagouda N Patil

A software defined radio (SDR) is a radio transmitter/receiver that uses reconfigurable hardware and software for encoding/decoding, modulation/demodulation, and encrypting/decrypting. This allows much more power and flexibility when designing any radio system. The AES algorithm is a block cipher that can encrypt and decrypt digital information. The AES algorithm is capable of using cryptograph...

2015
Gao Haifeng

The Advanced Encryption Standard (AES) was widely accepted as the de facto standard in many securityrelated fields such as Embedded Development, Information Management, and Network Communication etc. In this paper, we firstly study the theory of AES algorithm and then conduct performance analysis of AES algorithm on MPC processor whose frequency is 800MHz according to the superscalar pipeline o...

2000
John Worley Bill Worley Tom Christian Christopher Worley

The Advanced Encryption Standard selection process has, for the first time, included software execution speed as a relevant criterion for the choice of the next standard. The initial submissions included keying, encryption, and decryption execution times, in clock cycles, for Intel Pentium, Pentium II, and Pentium Pro microprocessors. While Pentium execution speeds are important, by no means do...

Journal: :RFC 2004
Uri Blumenthal Fabio Maino Keith McCloghrie

This document describes a symmetric encryption protocol that supplements the protocols described in the User-based Security Model (USM), which is a Security Subsystem for version 3 of the Simple Network Management Protocol for use in the SNMP Architecture. The symmetric encryption protocol described in this document is based on the Advanced Encryption Standard (AES) cipher algorithm used in Cip...

2004
U. Blumenthal F. Maino

This document describes a symmetric encryption protocol that supplements the protocols described in the User-based Security Model (USM), which is a Security Subsystem for version 3 of the Simple Network Management Protocol for use in the SNMP Architecture. The symmetric encryption protocol described in this document is based on the Advanced Encryption Standard (AES) cipher algorithm used in Cip...

Journal: :Microelectronics Journal 2003
Kaijie Wu Piyush Mishra Ramesh Karri

Fault-based side channel cryptanalysis is very effective against symmetric and asymmetric encryption algorithms. Although straightforward hardware and time redundancy based concurrent error detection (CED) architectures can be used to thwart such attacks, they entail significant overhead (either area or performance). In this paper we investigate two systematic approaches to low-cost, low-latenc...

Journal: :IEEE Trans. on CAD of Integrated Circuits and Systems 2002
Ramesh Karri Kaijie Wu Piyush Mishra Yongkook Kim

Fault-based side-channel cryptanalysis is very effective against symmetric and asymmetric encryption algorithms. Although straightforward hardware and time redundancy-based concurrent error detection (CED) architectures can be used to thwart such attacks, they entail significant overheads (either area or performance). The authors investigate systematic approaches to low-cost low-latency CED tec...

2011
D. McGrew

This memo describes the use of the Advanced Encryption Standard (AES) with 192and 256-bit keys within the Secure RTP (SRTP) protocol. It details counter mode encryption for SRTP and Secure Realtime Transport Control Protocol (SRTCP) and a new SRTP Key Derivation Function (KDF) for AES-192 and AES-256.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید