Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
AES (Advance Encryption Standard) adalah teknik merahasiakan sandi atau data sesuai standarisasi dari FIPS (Federasi Information Processing Standard) versi 197 dengan menggunakan algoritma rijndael. AES dibuat oleh kriptografer asal... more
    • by 
    •   7  
      C#AESKriptografiEnkripsi
Cryptography is one of the most integral components when trying to maintain achieve a secure communication medium and determining the best cryptography algorithm is as important as having a secure communication. In this paper, we will... more
    • by  and +1
    •   2  
      Symmetric key encryptionRijndael
    • by 
    •   12  
      AnimationPrivacyRecyclingCryptography
A proposed FPGA-based implementation of the Advanced Encryption Standard (AES) algorithm is presented in this paper. This implementation is compared with other works to show the efficiency. The design uses an iterative looping approach... more
    • by 
    •   6  
      FPGAEncryptionAESDecryption
Problem statement: Image encryption needs to be secure by resisting statistical attacks and other types of attacks. Approach: The new algorithm, call it the Shuffle Encryption Algorithm (SEA), applies nonlinear s-box byte substitution.... more
    • by 
    •   6  
      Computer ScienceStatistical AnalysisCryptographyImage Encryption
    • by 
    •   4  
      AESInvarianceStructural PropertiesRijndael
    • by 
    •   5  
      CryptographyData SecuritySubstitutionEncryption Algorithms
In this paper, we proposed a new approach for key scheduling algorithm which is an enhancement of the Rijndael key scheduling. This proposed algorithm was developed to improve the weaknesses that has in the Rijndael key schedule. The key... more
    • by 
    •   7  
      Computer ScienceInformation TechnologySecurityCryptography
    • by 
    •   6  
      Computer ScienceStatistical AnalysisCryptographyImage Encryption
    • by 
    •   13  
      AESBlock CiphersStream CiphersSerpent
    • by 
    •   6  
      Computer ScienceStatistical AnalysisCryptographyImage Encryption
A real-time video encryption module, developed to be used on an electrical accelerated mini-helicopter (UAV), is presented in this paper. The surveillance system is composed from six modules: image capture, encryption, two radio link... more
    • by 
    •   7  
      Computer ScienceEncryptionEmbeddedReal Time
Cryptography is one of the most integral components when trying to maintain achieve a secure communication medium and determining the best cryptography algorithm is as important as having a secure communication. In this paper, we will... more
    • by 
    •   2  
      Symmetric key encryptionRijndael
Implementation in one FPGA of the AES-Rijndael in Offset Codebook (OCB) and Electronic Codebook (ECB) modes of operation was developed and experimentally tested using the Insight Development Kit board, based on Xilinx Virtex II XC2V1000-4... more
    • by 
    •   12  
      MicroelectronicsFPGAEncryptionFPGA implementation
    • by 
    •   16  
      Hash FunctionsCryptanalysisProvable SecurityDesign Strategy
    • by 
    •   13  
      FPGAEmbedded SoftwareCryptographyField-Programmable Gate Arrays
AES advanced encryption standard algorithm was designed to resist classical methods of cryptanalysis (e.g. linear or differential attacks), which were based on probabilistic characteristics. But, it has not mature immunity against... more
    • by 
    •   12  
      AlgebraComputer ScienceProductionCryptography
Abstract. Several recently proposed ciphers, for example Rijndael and Serpent, are built with layers of small S-boxes interconnected by linear key-dependent layers. Their security relies on the fact, that the classical methods of... more
    • by 
    •   18  
      MathematicsComputer ScienceSystem IdentificationParameter estimation
    • by 
    •   9  
      MathematicsComputer SciencePure MathematicsBlock Ciphers
    • by 
    •   6  
      Information TheoryCryptanalysisBlock CipherRijndael
    • by 
    •   3  
      FPGAAsynchronousRijndael
    • by 
    •   16  
      Hash FunctionsCryptanalysisProvable SecurityDesign Strategy
    • by 
    •   6  
      Distributed ComputingBlock CipherCritical Path MethodData Confidentiality
    • by 
    •   5  
      Computer ScienceStateASCIIPlaintext
    • by 
    •   8  
      MathematicsComputer ScienceAESLinear Cryptanalysis
    • by 
    •   5  
      Hash FunctionsDesign StrategyAESRijndael