A low area high speed FPGA implementation of AES architecture for cryptography application
Nowadays, a huge amount of digital data is frequently changed among different embedded
devices over wireless communication technologies. Data security is considered an important …
devices over wireless communication technologies. Data security is considered an important …
Based blockchain-PSO-AES techniques in finger vein biometrics: A novel verification secure framework for patient authentication
The main objective of this study is to propose a novel verification secure framework for
patient authentication between an access point (patient enrolment device) and a node …
patient authentication between an access point (patient enrolment device) and a node …
Modified advanced encryption standard algorithm for information security
The wide acceptability of Advanced Encryption Standard (AES) as the most efficient of all of
the symmetric cryptographic techniques has further opened it up to more attacks. Efforts that …
the symmetric cryptographic techniques has further opened it up to more attacks. Efforts that …
Resource-shared crypto-coprocessor of AES Enc/Dec with SHA-3
Cryptographic co-processors are integral to the modern System-on-Chips. Flexibility in such
designs serves dual purpose, ie, it enables acceleration of different essential cryptographic …
designs serves dual purpose, ie, it enables acceleration of different essential cryptographic …
Based medical systems for patient's authentication: Towards a new verification secure framework using CIA standard
In medical systems for patient's authentication, keeping biometric data secure is a general
problem. Many studies have presented various ways of protecting biometric data especially …
problem. Many studies have presented various ways of protecting biometric data especially …
Implementasi Kriptografi AES-128 Untuk Mengamankan URL (Uniform Resource Locator) dari SQL Injection
H Wijaya - Akademika Jurnal, 2020 - ejournal.lppmunidayan.ac.id
Metode SQL injection digunakan untuk memasukan perintah atau kode khusus SQL
sebagai masukkan pada suatu website untuk mendapatkan informasi server maupun akses …
sebagai masukkan pada suatu website untuk mendapatkan informasi server maupun akses …
An encryption based on DNA and AES algorithms for hiding a compressed text in colored Image
QS Alsaffar, HN Mohaisen… - IOP Conference Series …, 2021 - iopscience.iop.org
The vast serious security challenges has created new secured ways of transmitting
information and reduce the chance of hackers to use their methods to analyse the …
information and reduce the chance of hackers to use their methods to analyse the …
A low-cost and highly compact FPGA-based encryption/decryption architecture for AES algorithm
Nowadays, the design of ultra-compact area advanced encryption standard (AES)
architectures is highly demanded by the electronics industry since many of these …
architectures is highly demanded by the electronics industry since many of these …
Reliable advanced encryption standard hardware implementation: 32-bit and 64-bit data-paths
Cryptographic primitives are extensively used in today's applications to provide the desired
security. Malicious or accidental faults that occur in the hardware implementations of …
security. Malicious or accidental faults that occur in the hardware implementations of …
Digital Implementation of an Improved LTE Stream Cipher Snow‐3G Based on Hyperchaotic PRNG
M Madani, I Benkhaddra, C Tanougast… - Security and …, 2017 - Wiley Online Library
SNOW‐3G is a stream cipher used by the 3GPP standards as the core part of the
confidentiality and integrity algorithms for UMTS and LTE networks. This paper proposes an …
confidentiality and integrity algorithms for UMTS and LTE networks. This paper proposes an …