A low area high speed FPGA implementation of AES architecture for cryptography application

TM Kumar, KS Reddy, S Rinaldi, BD Parameshachari… - Electronics, 2021 - mdpi.com
Nowadays, a huge amount of digital data is frequently changed among different embedded
devices over wireless communication technologies. Data security is considered an important …

Based blockchain-PSO-AES techniques in finger vein biometrics: A novel verification secure framework for patient authentication

AH Mohsin, AA Zaidan, BB Zaidan, OS Albahri… - Computer Standards & …, 2019 - Elsevier
The main objective of this study is to propose a novel verification secure framework for
patient authentication between an access point (patient enrolment device) and a node …

Modified advanced encryption standard algorithm for information security

OC Abikoye, AD Haruna, A Abubakar, NO Akande… - Symmetry, 2019 - mdpi.com
The wide acceptability of Advanced Encryption Standard (AES) as the most efficient of all of
the symmetric cryptographic techniques has further opened it up to more attacks. Efforts that …

Resource-shared crypto-coprocessor of AES Enc/Dec with SHA-3

A Khalid, A Aziz, C Wang, M O'Neill… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cryptographic co-processors are integral to the modern System-on-Chips. Flexibility in such
designs serves dual purpose, ie, it enables acceleration of different essential cryptographic …

Based medical systems for patient's authentication: Towards a new verification secure framework using CIA standard

AH Mohsin, AA Zaidan, BB Zaidan, OS Albahri… - Journal of medical …, 2019 - Springer
In medical systems for patient's authentication, keeping biometric data secure is a general
problem. Many studies have presented various ways of protecting biometric data especially …

Implementasi Kriptografi AES-128 Untuk Mengamankan URL (Uniform Resource Locator) dari SQL Injection

H Wijaya - Akademika Jurnal, 2020 - ejournal.lppmunidayan.ac.id
Metode SQL injection digunakan untuk memasukan perintah atau kode khusus SQL
sebagai masukkan pada suatu website untuk mendapatkan informasi server maupun akses …

An encryption based on DNA and AES algorithms for hiding a compressed text in colored Image

QS Alsaffar, HN Mohaisen… - IOP Conference Series …, 2021 - iopscience.iop.org
The vast serious security challenges has created new secured ways of transmitting
information and reduce the chance of hackers to use their methods to analyse the …

A low-cost and highly compact FPGA-based encryption/decryption architecture for AES algorithm

C Equihua, E Anides, JL García… - IEEE Latin America …, 2021 - ieeexplore.ieee.org
Nowadays, the design of ultra-compact area advanced encryption standard (AES)
architectures is highly demanded by the electronics industry since many of these …

Reliable advanced encryption standard hardware implementation: 32-bit and 64-bit data-paths

S Sheikhpour, A Mahani, N Bagheri - Microprocessors and Microsystems, 2021 - Elsevier
Cryptographic primitives are extensively used in today's applications to provide the desired
security. Malicious or accidental faults that occur in the hardware implementations of …

Digital Implementation of an Improved LTE Stream Cipher Snow‐3G Based on Hyperchaotic PRNG

M Madani, I Benkhaddra, C Tanougast… - Security and …, 2017 - Wiley Online Library
SNOW‐3G is a stream cipher used by the 3GPP standards as the core part of the
confidentiality and integrity algorithms for UMTS and LTE networks. This paper proposes an …