نتایج جستجو برای: advanced encryption standard

تعداد نتایج: 772288  

Journal: :iJES 2014
Dhanya Pushkaran Neethu Bhaskar

With the ever increasing growth of data communication, hardware encryption technology will become an irreplaceable safety technology. In this paper, I present a method of AES encryption and decryption algorithm with 128 bit key on an FPGA. In order to protect “data-at-rest” in memory from differential power analysis attacks with high-throughput advanced encryption standard (AES) engine with mas...

2000
Donald Byron Johnson

In a paper submitted previously, the author argued that a new AES evaluation criterion of future resiliency be added, defined as the ability to respond to the uncertain future and that this criterion could best be met by NIST selecting multiple disparate AES winners. This paper continues that discussion by providing more rationale. It also asks some questions and explores possible outcomes of t...

2000
Miles E. Smid

Introduction This report was developed for the National Institute of Standards and Technology (NIST) as the first deliverable under Purchase Order 43SBNB067018. It is intended to suggest one or more strategies that the Computer Security Division at NIST can use to 1) systematically organize and analyze public comments on the AES finalists and the AES process, and 2) prepare a Round 2 status rep...

2000
Marine Minier Henri Gilbert

Crypton is a 12-round blockcipher proposed as an AES candidate by C.H. Lim in 1998. In this paper, we show how to exploit some statistical deficiencies of the Crypton round function to mount stochastic attacks on round-reduced versions of Crypton. Though more efficient than the best differential and linear attacks, our attacks do not endanger the practical security offered by Crypton.

2000
Ross J. Anderson Eli Biham Lars R. Knudsen

Serpent should be chosen because it is the most secure of the AES finalists. Not only does it have ample safety margin, but its simple structure enables us to be sure that none of the currently known attacks will work. It is also simple to check that an implementation is correct. Although Serpent is not as fast as the other finalists on the 200 MHz Pentium machine used for round 1 benchmarking,...

2013
SALIM M. WADI NASHARUDDIN ZAINAL

The high security communication systems became an urgent need in recent years for both governments and peoples desiring protection from signal interception. Advanced Encryption Standard (AES) is a famous block encryption algorithm which has several advantages in data encryption. However, AES suffer from some drawbacks such as high computations, pattern appearance if apply for image encryption, ...

Journal: :JIP (Jurnal Informatika Polinema) 2022

Penggunaannya yang kian massif dan banyakya data informasi tersebar di internet mungkin saja terdapat bersifat rahasia, menjadikan tersebut rawan untuk disalahgunakan dari tindakan illegal oleh pihak tidak bertanggung jawab. Faktor keamanan menjadi hal sangat penting agar tetap aman terjamin keasliannya. Maka dibutuhkan metode asli. Kriptografi adalah mengamankan digital dengan cara mengubah me...

Journal: :International Journal of Computing and Digital Systems 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید