AES ENCRYPTION ALGORITHM IEEE PAPER 2018
Circuit and System Design for Optimal Lightweight AES Encryption on FPGA.
free download
ABSTRACT The substitution box (or commonly termed as S-Box) is a non-linear transformation, and known as the bottleneck of the overall operation in AES cipher. Due to recent emergence of high performance and lightweight applications, the required optimum
Design of an AES Device as Device Under Test in a DPA Attack
free download
ABSTRACT This paper presents a design for the implementation of the AES encryption algorithm in the hardware system. The proposed device is intended to be a device under test in a differential power analysis (DPA) attack. This device uses AES encryption with 128bit
ARSMS: A Hybrid Secured SMS Protocol for Smart Home using AES and RC4
free download
Summary In the 21st century, people are more engrossed in how they can control their homes and secure them from intruders. Such realities have been made possible by the introduction of Short Message Services (SMS) which are used entirely to control different
Secure Use of Cloud Storage of Data on Smartphones using Atomic AES on ARM Architectures
free download
ABSTRACT Security of data is of great importance to smartphones users today. Cloud computing provides unlimited storage for its users but secure transmission and retrieval of data from the cloud are of great challenge. This work made use of Atomic Advanced
TRUE COLOR IMAGE ENCRYPTION BASED ON DNA SEQUENCE, 3D CHAOTIC MAP, AND KEY-DEPENDENT DNA S-BOX OF AES .
free download
ABSTRACT Digital image encryption techniques play crucial roles in preventing unauthorized accsess. In this study, color image encryption and decryption are performed through a technique that applies a 3Dchaotic map, DNA sequence, and the key-dependent
ENGINEERING SCIENCESRESEARCH TECHNOLOGY ENHANCING THE SECURITY OF THE CLOUD COMPUTING WITH TRIPLE AES PGP OVER SSL
free download
ABSTRACT The cloud computing is indispensable to the business world today. It provides keen business insights. Cloud technology makes it possible to store this data and ensure that it is easily accessible. It is like storage space available virtually to the user and the
Synthesis of Cellular Automata Cryptography using AES Algorithm
free download
ABSTRACT Secure system is most important part in the data communication. A digital media can be transmitted easily in real time anywhere at any time due to the multimedia technology and internet, but to maintaining a security of information is a biggest problem now a days
A First-Order SCA Resistant AES without Fresh Randomness
free download
ABSTRACT . Since the advent of Differential Power Analysis (DPA) in the late 1990s protecting embedded devices against Side-Channel Analysis (SCA) attacks has been a major research effort. Even though many different first-order secure masking schemes are
ACUTE ENCEPHALITIS SYNDROME ( AES ) ASSOCIATED WITH SOCIOCULTURAL AND ENVIRONMENTAL RISK FACTORS IN INFANTS/CHILDREN OF
free download
BACKGROUND Acute encephalitis syndrome is a group of clinical neurologic manifestation caused by wide range of viruses, bacteria, fungus, parasites, spirochetes, chemicals and toxins. According to AES guidelines-Acute encephalitis syndrome due to unknown agent is
Destructive and Nondestructive Analysis of Some Modern Coins using ICP- AES and PIXE Techniques
free download
ABSTRACT In this work, The ICP- AES (Inductively Coupled Plasma Atomic Emission Spectroscopy) and PIXE (Proton Induced X-ray Emission) techniques were used to determine the elemental compositions of some modern coins. The coins of interest were
New Approaches for Distinguishers and Attacks on round-reduced AES
free download
ABSTRACT . At Eurocrypt 2017 the first secret-key distinguisher for 5-round AES has been presented. Although it allows to distinguish a random permutation from an AESlike one, it seems (rather) hard to exploit such a distinguisher in order to implement a key-recovery
New Rigorous Analysis of Truncated Differentials for 5-round AES
free download
ABSTRACT . Since the development of cryptanalysis of AES and AESlike constructions in the late 1990s, the set of inputs (or a subset of it) which differ only in one diagonal has special importance. It appears in various (truncated) differential, integral, and impossible differential CSE PROJECTS