Výsledky vyhľadávania - "aes algorithm"
-
1
An improvement of both security and reliability for AES implementations
ISSN: 1319-1578Vydavateľské údaje: Springer 01.11.2022Vydané v Journal of King Saud University. Computer and information sciences (01.11.2022)“… Countermeasures are then developed and validated to protect the hardware implementation of cryptographic algorithms such as AES algorithm…”
Získať plný text
Journal Article -
2
PPG-KeyGen: Using Photoplethysmogram for Key Generation in Wearable Devices
ISSN: 1877-0509, 1877-0509Vydavateľské údaje: Elsevier B.V 2021Vydané v Procedia computer science (2021)“… The second approach is realized by utilizing the Advanced Encryption Standard (AES) algorithm and IBI as the seed generator for the AES…”
Získať plný text
Journal Article -
3
Deep learning for side-channel analysis and introduction to ASCAD database
ISSN: 2190-8508, 2190-8516Vydavateľské údaje: Berlin/Heidelberg Springer Berlin Heidelberg 01.06.2020Vydané v Journal of cryptographic engineering (01.06.2020)“…Recent works have demonstrated that deep learning algorithms were efficient to conduct security evaluations of embedded systems and had many advantages…”
Získať plný text
Journal Article -
4
Analysis of Results from Integrated Safety Assessment of Research Reactors (INSARR) Missions
ISBN: 9201103247, 9789201103246Vydavateľské údaje: Vienna International Atomic Energy Agency 2024Získať plný text
E-kniha -
5
Design of AES Pipelined Architecture for Image Encryption/Decryption Module
ISSN: 2089-4864, 2089-4864Vydavateľské údaje: Yogyakarta IAES Institute of Advanced Engineering and Science 01.11.2014Vydané v International journal of reconfigurable and embedded systems (01.11.2014)“… The available AES algorithm is used for data and it is…”
Získať plný text
Journal Article -
6
Data Security and Privacy using DNA Cryptography and AES Method in Cloud Computing
ISSN: 2768-0673Vydavateľské údaje: IEEE 11.11.2021Vydané v International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (Online) (11.11.2021)“… The AES algorithm employs an overly simplistic algebraic structure. Each block employs the same encryption scheme, and AES is subject to brute force and MITM attacks…”
Získať plný text
Konferenčný príspevok.. -
7
Analysis of energy consumption of RC4 and AES algorithms in wireless LANs
ISBN: 9780780379749, 0780379748Vydavateľské údaje: IEEE 2003Vydané v Globecom 2003, IEEE (2003)“… A wireless device, usually with very limited resources, especially battery power, is subject to the problem of energy consumption due to encryption algorithms…”
Získať plný text
Konferenčný príspevok.. -
8
Hardware Efficient Realization of 128 bit Advanced Encryption Standard in FPGA
Vydavateľské údaje: IEEE 04.05.2024Vydané v 2024 Intelligent Systems and Machine Learning Conference (ISML) (04.05.2024)“… The Advanced Encryption Standard (AES) algorithm, one of the security…”
Získať plný text
Konferenčný príspevok.. -
9
Side-channel information leak detection with wavelet transformation
ISSN: 2226-1494, 2500-0373Vydavateľské údaje: ITMO University 01.12.2019Vydané v Nauchno-tekhnicheskiĭ vestnik informat͡s︡ionnykh tekhnologiĭ, mekhaniki i optiki (01.12.2019)“…Subject of study. The paper presents the results of the experimental study of a wavelet-based pre-processing that was used to increase the amount of statistically-discoverable information leakage in a side-channel signal…”
Získať plný text
Journal Article -
10
SIDE-CHANNEL INFORMATION LEAK DETECTION WITH WAVELET TRANSFORMATION
ISSN: 2226-1494, 2500-0373Vydavateľské údaje: Saint Petersburg St. Petersburg National Research University of Information Technologies, Mechanics and Optics 01.11.2019Vydané v Nauchno-tekhnicheskiĭ vestnik informat͡s︡ionnykh tekhnologiĭ, mekhaniki i optiki (01.11.2019)“…Subject of study. The paper presents the results of the experimental study of a wavelet-based pre-processing that was used to increase the amount of statistically-discoverable information leakage in a side-channel signal…”
Získať plný text
Journal Article -
11
Improving Safety of an Automotive Aes-Gcm Core and Its Impact on Side-Channel Protection
ISBN: 9798382371153Vydavateľské údaje: ProQuest Dissertations & Theses 01.01.2020“… The AES algorithm does not currently have any effective vulnerability, but the same does not happen with its implementations, which are subject to side-channel attacks, where information that results…”
Získať plný text
Dissertation -
12
Multi-level attacks: An emerging security concern for cryptographic hardware
ISBN: 9781612842080, 1612842089ISSN: 1530-1591Vydavateľské údaje: IEEE 01.03.2011Vydané v 2011 Design, Automation & Test in Europe (01.03.2011)“…Modern hardware and software implementations of cryptographic algorithms are subject to multiple sophisticated attacks, such as differential power analysis (DPA…”
Získať plný text
Konferenčný príspevok.. -
13
Differential Power Analysis of 8-Bit Datapath AES for IoT Applications
ISSN: 2324-9013Vydavateľské údaje: IEEE 01.08.2018Vydané v 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (01.08.2018)“…) is popular for its mature algorithm, compact architecture and low power consumption. However, it is also subject to the side channel analysis (SCA…”
Získať plný text
Konferenčný príspevok.. -
14
Implementation and analysis of the generalised new mersenne number transforms for encryption
Vydavateľské údaje: ProQuest Dissertations & Theses 01.01.2015“…Encryption is very much a vast subject covering myriad techniques to conceal and safeguard data and communications…”
Získať plný text
Dissertation -
15
Dynamic Adjustment of the Chaos-Based Security in Real-Time Energy Harvesting Sensors
Vydavateľské údaje: IEEE 01.08.2013Vydané v 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing (01.08.2013)“… Nevertheless, they are subject to many requirements such as real-time constraints, energy limitations, and security requirements for the communications…”
Získať plný text
Konferenčný príspevok.. -
16
Cache Attacks: An Information and Complexity Theoretic Approach
ISBN: 9781467302289, 1467302287ISSN: 2157-4952Vydavateľské údaje: IEEE 01.05.2012Vydané v 2012 5th International Conference on New Technologies, Mobility and Security (NTMS) (01.05.2012)“… Although AES algorithm is chosen as the subject algorithm in the case study, the method is generic in the sense that it can be applied in many other algorithms that are subject to side-channel attacks…”
Získať plný text
Konferenčný príspevok.. -
17
An efficient hardware-based fault diagnosis scheme for AES: performances and cost
ISBN: 9780769522418, 0769522416ISSN: 1550-5774Vydavateľské údaje: Los Alamitos CA IEEE 2004Vydané v 19th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, 2004. DFT 2004. Proceedings (2004)“…Since standardization in 2001, the Advanced Encryption Standard has been the subject of many research efforts, aimed at developing efficient hardware implementations with reduced area and latency…”
Získať plný text
Konferenčný príspevok.. -
18
The high frequency game changer: how automated trading strategies have revolutionized the markets
ISBN: 9780470770382, 0470770384Vydavateľské údaje: Hoboken, NJ Wiley 2011Získať plný text
E-kniha

