ChevroCrypto–Security & Cryptography Broker
F Alves, N Mateus-Coelho… - 2022 10th International …, 2022 - ieeexplore.ieee.org
The Internet of Things technologies are increasingly incorporated into the various
challenges that arise, and it is becoming increasingly important to ensure data protection …
challenges that arise, and it is becoming increasingly important to ensure data protection …
An RTL Implementation of the Data Encryption Standard (DES)
Data Encryption Standard (DES) is based on the Feistel block cipher, developed in 1971 by
IBM cryptography researcher Horst Feistel. DES uses 16 rounds of the Feistel structure. But …
IBM cryptography researcher Horst Feistel. DES uses 16 rounds of the Feistel structure. But …
Encryption file system framework-proof of concept
F Alves, N Mateus-Coelho, M Cruz-Cunha - Procedia Computer Science, 2021 - Elsevier
Edge Computing, also known as the IoT ecosystem, has recently become a cornerstone of
computational evolution. Most recently, challenges emerged in the act of protecting such …
computational evolution. Most recently, challenges emerged in the act of protecting such …
Hardware context switch-based cryptographic accelerator for handling multiple streams
A Sasongko, IMN Kumara, A Wicaksana… - ACM Transactions on …, 2021 - dl.acm.org
The confidentiality and integrity of a stream has become one of the biggest issues in
telecommunication. The best available algorithm handling the confidentiality of a data …
telecommunication. The best available algorithm handling the confidentiality of a data …
ChevroCrypto–Cryptography API
F Alves, N Mateus-Coelho, M Cruz-Cunha - Procedia Computer Science, 2022 - Elsevier
The world of IoT systems is increasingly inserted into people's daily lives, whether in people
in general who systematically use these technologies in their daily lives and companies …
in general who systematically use these technologies in their daily lives and companies …
Safety comparison analysis against known/chosen plaintext attack of RBF (random block feedback) mode to other block cipher modes of operation
Y Kim, K Yi - The Journal of Korean Institute of Communications …, 2014 - koreascience.kr
Data security and integrity is a critical issue in data transmission over wired/wireless links. A
large amount of data is encrypted before transmission, by block cipher using mode of …
large amount of data is encrypted before transmission, by block cipher using mode of …
Reversible Logic based Modified Design of AES-CBC Mode.
RB Shettar - Grenze International Journal of Engineering & …, 2018 - search.ebscohost.com
Advanced encryption standard (AES) is the most widely used secure symmetric algorithm
nowadays. AES is a block cipher, in which different operations are performed on group of …
nowadays. AES is a block cipher, in which different operations are performed on group of …
[PDF][PDF] An Analysis of Flipped Cryptographic Block Cipher Mechanism For Image
S Narasimhan - academia.edu
This paper proposes and examines a different encryption algorithm for Cipher Block
Chaining mode (CBC) which is designed for improving the security of a cryptographic …
Chaining mode (CBC) which is designed for improving the security of a cryptographic …
[PDF][PDF] 블록암호연산모드RBF (Random Block Feedback) 의알려진/선택평문공격에대한안전성비교분석
김윤정, 이강 - 한국통신학회논문지, 2014 - journal.kics.or.kr
요 약데이타 보안과 무결성은 유무선 통신 환경에서 데이터 전송 시에 중요한 요소이다. 대량의
데이터는 전송 전에, 통상 암호 연산 모드를 이용한 블록 암호 알고리즘에 의하여 암호화된다 …
데이터는 전송 전에, 통상 암호 연산 모드를 이용한 블록 암호 알고리즘에 의하여 암호화된다 …