AES ENCRYPTION ALGORITHM IEEE PAPER 2018



Circuit and System Design for Optimal Lightweight AES Encryption on FPGA.
free download

ABSTRACT The substitution box (or commonly termed as S-Box) is a non-linear transformation, and known as the bottleneck of the overall operation in AES cipher. Due to recent emergence of high performance and lightweight applications, the required optimum

Design of an AES Device as Device Under Test in a DPA Attack
free download

ABSTRACT This paper presents a design for the implementation of the AES encryption algorithm in the hardware system. The proposed device is intended to be a device under test in a differential power analysis (DPA) attack. This device uses AES encryption with 128bit

ARSMS: A Hybrid Secured SMS Protocol for Smart Home using AES and RC4
free download

Summary In the 21st century, people are more engrossed in how they can control their homes and secure them from intruders. Such realities have been made possible by the introduction of Short Message Services (SMS) which are used entirely to control different

Secure Use of Cloud Storage of Data on Smartphones using Atomic AES on ARM Architectures
free download

ABSTRACT Security of data is of great importance to smartphones users today. Cloud computing provides unlimited storage for its users but secure transmission and retrieval of data from the cloud are of great challenge. This work made use of Atomic Advanced

TRUE COLOR IMAGE ENCRYPTION BASED ON DNA SEQUENCE, 3D CHAOTIC MAP, AND KEY-DEPENDENT DNA S-BOX OF AES .
free download

ABSTRACT Digital image encryption techniques play crucial roles in preventing unauthorized accsess. In this study, color image encryption and decryption are performed through a technique that applies a 3Dchaotic map, DNA sequence, and the key-dependent

ENGINEERING SCIENCESRESEARCH TECHNOLOGY ENHANCING THE SECURITY OF THE CLOUD COMPUTING WITH TRIPLE AES PGP OVER SSL
free download

ABSTRACT The cloud computing is indispensable to the business world today. It provides keen business insights. Cloud technology makes it possible to store this data and ensure that it is easily accessible. It is like storage space available virtually to the user and the

Synthesis of Cellular Automata Cryptography using AES Algorithm
free download

ABSTRACT Secure system is most important part in the data communication. A digital media can be transmitted easily in real time anywhere at any time due to the multimedia technology and internet, but to maintaining a security of information is a biggest problem now a days

A First-Order SCA Resistant AES without Fresh Randomness
free download

ABSTRACT . Since the advent of Differential Power Analysis (DPA) in the late 1990s protecting embedded devices against Side-Channel Analysis (SCA) attacks has been a major research effort. Even though many different first-order secure masking schemes are

ACUTE ENCEPHALITIS SYNDROME ( AES ) ASSOCIATED WITH SOCIOCULTURAL AND ENVIRONMENTAL RISK FACTORS IN INFANTS/CHILDREN OF
free download

BACKGROUND Acute encephalitis syndrome is a group of clinical neurologic manifestation caused by wide range of viruses, bacteria, fungus, parasites, spirochetes, chemicals and toxins. According to AES guidelines-Acute encephalitis syndrome due to unknown agent is

Destructive and Nondestructive Analysis of Some Modern Coins using ICP- AES and PIXE Techniques
free download

ABSTRACT In this work, The ICP- AES (Inductively Coupled Plasma Atomic Emission Spectroscopy) and PIXE (Proton Induced X-ray Emission) techniques were used to determine the elemental compositions of some modern coins. The coins of interest were

New Approaches for Distinguishers and Attacks on round-reduced AES
free download

ABSTRACT . At Eurocrypt 2017 the first secret-key distinguisher for 5-round AES has been presented. Although it allows to distinguish a random permutation from an AESlike one, it seems (rather) hard to exploit such a distinguisher in order to implement a key-recovery

New Rigorous Analysis of Truncated Differentials for 5-round AES
free download

ABSTRACT . Since the development of cryptanalysis of AES and AESlike constructions in the late 1990s, the set of inputs (or a subset of it) which differ only in one diagonal has special importance. It appears in various (truncated) differential, integral, and impossible differential CSE PROJECTS

FREE IEEE PAPER AND PROJECTS

FREE IEEE PAPER