• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Analysis of AES Hardware Implementations (2003)

by S J Park
Add To MetaCart

Tools

Sorted by:
Results 1 - 3 of 3

• Background information

by Geoffrey Ottoy, Tom Hamelinckx, Bart Preneel, Lieven De Strycker, Jean-pierre Goemaere, Kaho Sint-lieven, K. U. Leuven Belgium
"... • About the research groups ..."
Abstract - Add to MetaCart
• About the research groups

AES Data Encryption in a ZigBee network:

by Geoffrey Ottoy, Lieven De Strycker, Geoffrey Ottoy, Tom Hamelinckx, Bart Preneel, Lieven De Strycker, Jean-pierre Goemaere , 2016
"... All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately. ..."
Abstract - Add to MetaCart
All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately.

unknown title

by unknown authors
"... Abstract—With the development of Computer Network and Communication Technology, a great mass of data and information need to be exchanged by public communication networks. High efficiency and high safety of data transmission become much more important. There are several information encryption algori ..."
Abstract - Add to MetaCart
Abstract—With the development of Computer Network and Communication Technology, a great mass of data and information need to be exchanged by public communication networks. High efficiency and high safety of data transmission become much more important. There are several information encryption algorithms of which, Advanced Encryption Standard (AES) and Rivest Shamir Adleman (RSA) are widely used two algorithms of symmetric encryption technology and asymmetric encryption technology respectively. The existing symmetric scheme-AES algorithm provides high speed stream for large data and uses less amount of computer resources but induces less degree of security in large amount of data. The asymmetric cryptographic algorithm or a public key cryptographic algorithm-RSA is more secure comparatively, as it has two keys one for encryption and another one for decryption, but is much slower and uses a huge amount of computer resources. In order to cope up with these short comings, a proposal to use an improved version of the hybrid encryption scheme is done, which is a combination of Advanced Encryption Standard (AES) and Rivest Shamir Adleman (RSA) with cross encrypted keys for secure key exchange and hybrid encryption for enhanced cipher-text security. This system is implemented on Spartan 3 FPGA using VHDL as the programing language.Synthesizing and implementation of the code is carried out on Xilinx-Project
(Show Context)

Citation Context

...he structure in Fig 1.The brief introduction is listedsas below:s1. The SubBytes operation: The SubBytes operation is asnon-linear byte substitution, operating on each byte of thesstate independently =-=[8]-=-. The substitution table (S-Box) issinvertible and is constructed by the composition of twostransformations: Take the multiplicative inverse in Rijndael'ssfinite field .Apply an affine transformation ...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University