An optimized S-box for advanced encryption standard (AES) design

OB Sahoo, DK Kole, H Rahaman - … International Conference on …, 2012 - ieeexplore.ieee.org
This work presents an optimized Substitution Box (S-Box) for Advanced Encryption Standard
(AES) design. The S-Box is one of the most important components of AES. During SubByte …

Improving video steganalysis using temporal correlation

V Pankajakshan, ATS Ho - Third International Conference on …, 2007 - ieeexplore.ieee.org
Steganalysis, the method to detect steganographically embedded hidden messages in
digital data, has received an increasing interest in recent years. Although significant …

An Encryption Algorithm to Prevent Domain Name System Cache Poisoning Attacks

XJ Li, M Ma, N Arjun - 2019 29th International …, 2019 - ieeexplore.ieee.org
One of the major security threats in domain name system (DNS) is Cache Poisoning (CP)
attack, where an attacker can change the IP address in the response packet or the database …

[PDF][PDF] Study and implementation of hardware security for single system

PR Gandhi - 2017 - scholarworks.calstate.edu
Today, we are living in the computer era where everything is getting digitized. Fund transfer,
trading of goods, information exchange so on and so forth, everything has been digitalized …