Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Leakage of information between two processes sharing the same processor cache has been exploited in many novel approaches targeting various cryptographic algorithms. The software implementation of AES is an especially attractive target... more
    • by  and +1
    •   2  
      CryptographyAdvanced Encryption Standards
Abstract — Genetic algorithm based Cryptanalysis has gained considerable attention due to its fast convergence time. This paper proposes a Genetic Algorithm (GA) based cryptanalysis scheme for breaking the key employed in Simplified- AES.... more
    • by 
    •   12  
      Computer ScienceInformation TechnologyInformation SecurityGenetic Algorithms
Today's world is growing rapidly over internet technologies. Steganography play an important role in the field of information security [1]. Video and images are very common choice for hiding data. In Visual cryptography we upload an image... more
    • by 
    •   4  
      ProtocolsVideo SteganographyVisual CryptographyAdvanced Encryption Standards
— Any algorithm is evaluated based on its confusion and diffusion property determining its strength to withstand the intruding attacks. AES (Advanced Encryption Standard), using 128-bit key size has the number of rounds processed over... more
    • by 
    •   5  
      Network SecurityWireless Network SecurityAdvanced Encryption Standards4G Network Security
Password protection is a major security concern the world is facing today. While there are many publications available that discuss ways to protect passwords and data, how widely user from around the world adhere to these rules are... more
    • by  and +1
    •   3  
      Network SecurityComputer Networks and Information SecurityAdvanced Encryption Standards
A construction method of í µí±† 8 S-boxes is given in [6]. These í µí±† 8 S-boxes are generated by the action of symmetric group í µí±† 8 on AES S-box and these are 40320 in number. In this paper, we bounce a new method for the... more
    • by 
    •   8  
      Mathematics of CryptographyInformation SecurityNetwork SecurityComputer Security
In this research work, a fast and lightweight AES-128 cypher based on the Xilinx ZCU102 FPGA board is presented, suitable for 5G communications. In particular, both encryption and decryption algorithms have been developed using a... more
    • by 
    •   5  
      VhdlField Programmable Gate ArrayAdvanced Encryption Standards5G Communications
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications.The journal... more
    • by 
    •   19  
      Mobile Ad Hoc NetworksMillimeter WavesThe Internet of ThingsIndoor Positioning
Advanced Encryption Standard (AES) has been the focus of Cryptanalysis since it was released in the 2001, November. The research gained more important when AES as declared as the Type-1 Suite-B Encryption Algorithm, by the NSA in... more
    • by 
    •   7  
      Network SecurityCryptographyEncryptionCryptanalysis
Security is one of the vital concerns especially in the current period with an extensive rise in the usage of the internet. So, an effective text encryption algorithm is of greater need for achieving an immense amount of privacy. In this... more
    • by 
    •   6  
      CryptographyText Encryption & Decryption AlgorithmEncryption AlgorithmsAdvanced Encryption Standards
    • by 
    •   20  
      Computer ScienceInformation TechnologyEducationInformation Security
Cloud computing has grown very quickly to become a promising business idea in the IT industry due to its characteristics such as cost reduction, flexibility, convenience, and scalability. The wide spread of Cloud Computing was accompanied... more
    • by 
    •   18  
      PrivacyComputer SecurityCryptographyEncryption
Masalah keamanan dan kerahasiaan data dan informasi merupakan suatu hal yang penting. Salah satu cara menjaga keamanan dan kerahasiaan data dan informasi adalah dengan teknik enkripsi dan dekripsi atau yang dikenal juga dengan... more
    • by  and +1
    •   18  
      Applied CryptographyEncryptionImage EncryptionImproving diffusion power of AES Rijndael with 8x8 MDS matrix
With the strong stimulation of computer networks, computer users increasingly important to find better ways to protect personal and confidential information. A common way to ensure that such information is unreadable string encryption of... more
    • by 
    •   6  
      Computer ScienceInformation TechnologyImage ProcessingCryptography
Dalam penerapan konsep IoT ini ternyata banyak kasus yang ditemukan pada perangkat IoT yaitu menjadi target kejahatan siber, dengan terhubungnya perangkat kedalam jaringan internet maka disitu akan timbul kerentanan dalam jaringan IoT,... more
    • by 
    •   2  
      Internet of Things (IoT)Advanced Encryption Standards
— Data security has become one of the most important concerns in the recent times. This has led to an increase in the importance of cryptography of the electronic data. Cryptography is the process of protecting digital information. Though... more
    • by 
    •   10  
      EngineeringCryptographyHardware Description LanguagesResearch
Patent application describing method to completely implement encryption algorithms as non-sequential hardware devices.
    • by 
    •   14  
      Computer ScienceAlgorithmsApplied CryptographyComputer Security
The increased of the use of computer & communications system by IT industries has increased the risk of theft of proprietary information. Cryptographic control (Encryption) is a primary method of protecting system resources. Control is... more
    • by 
    •   14  
      Risk mitigationComputer Science and TechnologyUnix Operating SystemAdvanced Encryption Standards
Advanced Encryption Standard (AES) Algorithm has been extensively applied in the present financial applications. Sub-channel attacks are one of the main problems occurred n the AES Algorithm. Asynchronous AES Architecture is one of the... more
    • by 
    •   6  
      Computer ScienceCryptographyNano TechnologyVerilog
During the last decades, information security has become a major issue. Encrypting and decrypting data have recently been widely investigated and developed because there is a demand for a stronger encryption and decryption which is very... more
    • by  and +1
    •   15  
      PKI (Cryptography)SecurityPublic Key InfrastructureEncryption
Sebuah pesan teks (SMS) Short Massage Servicec tidak terlalu diperhatikan tingkat keamanannya, banyak penguna pesan teks (SMS) tidak memperhatikan tingat kriminalitas yang timbul akibat kurangnya fasilitas yang melengkapi sistem keamanan... more
    • by 
    •   4  
      CryptographyTeknik InformatikaSms GatewayAdvanced Encryption Standards
ABSTRAK Advances in computer science and technology have affected every aspect of human life, including education. Information and data can be easily and quickly sent to consumers via a computer network. Data and information can be easily... more
    • by 
    •   11  
      Information SystemsAlgorithmsInformation TechnologyTechnology
Advanced Encryption Standard (AES) Algorithm has been extensively applied in the present financial applications. Sub-channel attacks are one of the main problems occurred n the AES Algorithm. Asynchronous AES Architecture is one of the... more
    • by 
    •   5  
      Subliminal ChannelAdvanced Encryption StandardsComplementary Metal-Oxide SemiconductorMix-Column
In this study, we reviewed biometric template protection schemes in subsisting literature and established that there is no reliable, efficacious and foolproof technique that assures diversity, revocability, security and optimal... more
    • by  and +1
    •   32  
      Information SystemsComputer ScienceVoting BehaviorInformation Security
This study was conducted to determine the authenticity of a certificate quickly. Certificate forgery problem is one of the important aspects of a study that has been done. In this case, it is related to the importance of the authenticity... more
    • by 
    •   6  
      MD5HashingIdentifikasiAdvanced Encryption Standards
Many Organizations share data through the network which provides numerous security vulnerabilities. In the existing systems, when a person wants to transfer details, they may send data over the network where data breaches may occur. So,... more
    • by  and +1
    •   19  
      Information SystemsComputer ScienceAlgorithmsInformation Technology
Developing a good database system and providing security control for the database has always been a big challenge. Encryption technique has previously been proposed to provide users with confidentiality in terms of outsource storage.... more
    • by 
    •   12  
      Computer ScienceParallel AlgorithmsInformation SecurityInformation Security Auditing
    • by 
    •   20  
      Computer ScienceDistributed ComputingEncryptionElliptic curve cryptography for encryption and digital signature
Image usage over the internet becomes more and more important each day. Over 3 billion images are shared each day over the internet which raise a concern about how to protect images copyrights? Or how to utilize image sharing experience?... more
    • by 
    •   8  
      Compressed SensingData HidingAdvanced Encryption StandardsRobust watermarking
    • by 
    •   20  
      Distributed ComputingEncryptionElliptic curve cryptography for encryption and digital signatureComputer Software
Two existing cryptosystems are being combined and proposed. It is the enhanced combination of KED (Key Encryption Decryption), a cryptosystem that uses modulo 69 and the AES (Advance Encryption Standard) cryptography. The strength of the... more
    • by 
    •   2  
      CryptographyAdvanced Encryption Standards
The increased of the use of computer & communications system by IT industries has increased the risk of theft of proprietary information. Advanced Encryption Standard (Encryption) is a primary method of protecting system resources. AES is... more
    • by 
    •   10  
      Infection control (Preventive medicine)Return on InvestmentDisaster Risk MitigationAdvanced Encryption Standards
Providing security to Mobile Ad-hoc Networks (MANETs) is one of the essential and demanding task in recent days, due to the mobility of nodes. Typically, the malicious or attacker nodes intend to access the data packet for interrupting... more
    • by 
    •   6  
      SecurityAdvanced Encryption StandardsParticle Swarm Optimization (PSO)Mobile ad hoc network (MANET
The leading causes of death worldwide are chronic illnesses suchlike diabetes, Heart Disease (HD), cancer as well as chronic respiratory malady. It is remarkably intricate to diagnose HD with disparate symptoms or features. With the... more
    • by 
    •   5  
      The Internet of ThingsArtificial Neural NetworksDeep LearningInternet of Things (IoT)
Dynamic Portable center points in military circumstances, for instance, a forefront or a debilitating area are subject to encounter the evil impacts of unpredictable framework system and nonstop assignments. Intrusion tolerant framework... more
    • by 
    •   6  
      Comparative Military SystemsDTNDelay/Disruption Tolerant NetworkAdvanced Encryption Standards
In latest years, due to the fast expansion and development of information technology, securities of confidential information come to be critically vital in digital data broadcasting. During the transmission through insecure communication... more
    • by 
    •   5  
      Mathematics of CryptographyComputer ScienceCryptographyEncryption
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
    • by 
    •   7  
      Image ProcessingChaos TheoryImage EncryptionChaotic Map
    • by 
    •   15  
      Distributed ComputingPKI (Cryptography)SecurityPublic Key Infrastructure
As the advancement in technology ,banking industry is facing several changes. Customer is now at the driving seat of new financial industry scenario as the whole control is now in the hands of customer. Due to the prospering technology,... more
    • by 
    •   10  
      Computer ScienceInformation SecurityComputer SecurityCryptography
Encryption algorithms play a dominant role in preventing unauthorized access to important data. This paper focus on the implementations of Data Encryption Standard (DES) and Advanced Encryption Standard (AES) algorithms on Microblaze soft... more
    • by 
    •   5  
      FPGACryptographyMicroblazeAdvanced Encryption Standards
Cryptographic applications are becoming increasingly more important in today's world of data exchange, big volumes of data need to be transferred safely from one location to another at high speed. In this paper, the parallel... more
    • by  and +1
    •   33  
      EncryptionStegnography and Encryption and Eye Tracking and AlgorithmsElliptic curve cryptography for encryption and digital signatureMPI
Password protection is a major security concern the world is facing today. While there are many publications available that discuss ways to protect passwords and data, how widely user from around the world adhere to these rules are... more
    • by 
    •   4  
      Computer ScienceNetwork SecurityComputer Networks and Information SecurityAdvanced Encryption Standards
Hardware implementation of cryptographic algorithms are widely used to secure wireless networks. They guarantee good security performance at low processing and energy costs. However, unlike traditional implementations, they are vulnerable... more
    • by 
    •   36  
      ViolenceRuralPeasants' WarEmbedded Systems