Výsledky vyhľadávania - "aes algorithm"

  • Zobrazené výsledky 1 - 18 z 18
Upresniť hľadanie
  1. 1

    An improvement of both security and reliability for AES implementations Autor Mouna Bedoui, Hassen Mestiri, Belgacem Bouallegue, Belgacem Hamdi, Mohsen Machhout

    ISSN: 1319-1578
    Vydavateľské údaje: Springer 01.11.2022
    “… Countermeasures are then developed and validated to protect the hardware implementation of cryptographic algorithms such as AES algorithm…”
    Získať plný text
    Journal Article
  2. 2

    PPG-KeyGen: Using Photoplethysmogram for Key Generation in Wearable Devices Autor Moosavi, Sanaz Rahimi

    ISSN: 1877-0509, 1877-0509
    Vydavateľské údaje: Elsevier B.V 2021
    Vydané v Procedia computer science (2021)
    “… The second approach is realized by utilizing the Advanced Encryption Standard (AES) algorithm and IBI as the seed generator for the AES…”
    Získať plný text
    Journal Article
  3. 3

    Deep learning for side-channel analysis and introduction to ASCAD database Autor Benadjila, Ryad, Prouff, Emmanuel, Strullu, Rémi, Cagli, Eleonora, Dumas, Cécile

    ISSN: 2190-8508, 2190-8516
    Vydavateľské údaje: Berlin/Heidelberg Springer Berlin Heidelberg 01.06.2020
    Vydané v Journal of cryptographic engineering (01.06.2020)
    “…Recent works have demonstrated that deep learning algorithms were efficient to conduct security evaluations of embedded systems and had many advantages…”
    Získať plný text
    Journal Article
  4. 4

    Analysis of Results from Integrated Safety Assessment of Research Reactors (INSARR) Missions Autor IAEA

    ISBN: 9201103247, 9789201103246
    Vydavateľské údaje: Vienna International Atomic Energy Agency 2024
    Získať plný text
    E-kniha
  5. 5

    Design of AES Pipelined Architecture for Image Encryption/Decryption Module Autor V. Kinge, Pravin, Honale, S.J., Bobade, C.M.

    ISSN: 2089-4864, 2089-4864
    Vydavateľské údaje: Yogyakarta IAES Institute of Advanced Engineering and Science 01.11.2014
    “… The available AES algorithm is used for  data and it is…”
    Získať plný text
    Journal Article
  6. 6

    Data Security and Privacy using DNA Cryptography and AES Method in Cloud Computing Autor Kumar, Anuj

    ISSN: 2768-0673
    Vydavateľské údaje: IEEE 11.11.2021
    “… The AES algorithm employs an overly simplistic algebraic structure. Each block employs the same encryption scheme, and AES is subject to brute force and MITM attacks…”
    Získať plný text
    Konferenčný príspevok..
  7. 7

    Analysis of energy consumption of RC4 and AES algorithms in wireless LANs Autor Prasithsangaree, P., Krishnamurthy, P.

    ISBN: 9780780379749, 0780379748
    Vydavateľské údaje: IEEE 2003
    Vydané v Globecom 2003, IEEE (2003)
    “… A wireless device, usually with very limited resources, especially battery power, is subject to the problem of energy consumption due to encryption algorithms…”
    Získať plný text
    Konferenčný príspevok..
  8. 8

    Hardware Efficient Realization of 128 bit Advanced Encryption Standard in FPGA Autor M, Hanumanthu, Kumar Gunjan, Vinit, G, Theja, T, Supraja, G, Theja Ramana, S, Sravani, Thirumalaiah, G.

    Vydavateľské údaje: IEEE 04.05.2024
    “… The Advanced Encryption Standard (AES) algorithm, one of the security…”
    Získať plný text
    Konferenčný príspevok..
  9. 9

    Side-channel information leak detection with wavelet transformation Autor Sleptsova, D.M., Levina, A.B.

    ISSN: 2226-1494, 2500-0373
    Vydavateľské údaje: ITMO University 01.12.2019
    “…Subject of study. The paper presents the results of the experimental study of a wavelet-based pre-processing that was used to increase the amount of statistically-discoverable information leakage in a side-channel signal…”
    Získať plný text
    Journal Article
  10. 10

    SIDE-CHANNEL INFORMATION LEAK DETECTION WITH WAVELET TRANSFORMATION Autor Sleptsova, D M, Levina, A B

    ISSN: 2226-1494, 2500-0373
    Vydavateľské údaje: Saint Petersburg St. Petersburg National Research University of Information Technologies, Mechanics and Optics 01.11.2019
    “…Subject of study. The paper presents the results of the experimental study of a wavelet-based pre-processing that was used to increase the amount of statistically-discoverable information leakage in a side-channel signal…”
    Získať plný text
    Journal Article
  11. 11

    Improving Safety of an Automotive Aes-Gcm Core and Its Impact on Side-Channel Protection Autor Teixeira, Dany José Correia

    ISBN: 9798382371153
    Vydavateľské údaje: ProQuest Dissertations & Theses 01.01.2020
    “… The AES algorithm does not currently have any effective vulnerability, but the same does not happen with its implementations, which are subject to side-channel attacks, where information that results…”
    Získať plný text
    Dissertation
  12. 12

    Multi-level attacks: An emerging security concern for cryptographic hardware Autor Ali, S S, Chakraborty, R S, Mukhopadhyay, D, Bhunia, S

    ISBN: 9781612842080, 1612842089
    ISSN: 1530-1591
    Vydavateľské údaje: IEEE 01.03.2011
    “…Modern hardware and software implementations of cryptographic algorithms are subject to multiple sophisticated attacks, such as differential power analysis (DPA…”
    Získať plný text
    Konferenčný príspevok..
  13. 13

    Differential Power Analysis of 8-Bit Datapath AES for IoT Applications Autor Xu, Jiaming, Fan, Ao, Lu, Minyi, Shan, Weiwei

    ISSN: 2324-9013
    Vydavateľské údaje: IEEE 01.08.2018
    “…) is popular for its mature algorithm, compact architecture and low power consumption. However, it is also subject to the side channel analysis (SCA…”
    Získať plný text
    Konferenčný príspevok..
  14. 14

    Implementation and analysis of the generalised new mersenne number transforms for encryption Autor Rutter, Nick

    Vydavateľské údaje: ProQuest Dissertations & Theses 01.01.2015
    “…Encryption is very much a vast subject covering myriad techniques to conceal and safeguard data and communications…”
    Získať plný text
    Dissertation
  15. 15

    Dynamic Adjustment of the Chaos-Based Security in Real-Time Energy Harvesting Sensors Autor Farajallah, M., El Assad, S., Chetto, Maryline

    Vydavateľské údaje: IEEE 01.08.2013
    “… Nevertheless, they are subject to many requirements such as real-time constraints, energy limitations, and security requirements for the communications…”
    Získať plný text
    Konferenčný príspevok..
  16. 16

    Cache Attacks: An Information and Complexity Theoretic Approach Autor Savas, E., Yilmaz, C.

    ISBN: 9781467302289, 1467302287
    ISSN: 2157-4952
    Vydavateľské údaje: IEEE 01.05.2012
    “… Although AES algorithm is chosen as the subject algorithm in the case study, the method is generic in the sense that it can be applied in many other algorithms that are subject to side-channel attacks…”
    Získať plný text
    Konferenčný príspevok..
  17. 17

    An efficient hardware-based fault diagnosis scheme for AES: performances and cost Autor Bertoni, G., Breveglieri, L., Koren, I., Maistri, P.

    ISBN: 9780769522418, 0769522416
    ISSN: 1550-5774
    Vydavateľské údaje: Los Alamitos CA IEEE 2004
    “…Since standardization in 2001, the Advanced Encryption Standard has been the subject of many research efforts, aimed at developing efficient hardware implementations with reduced area and latency…”
    Získať plný text
    Konferenčný príspevok..
  18. 18