Accelerating DES and AES algorithms for a heterogeneous many-core processor

B **ng, DD Wang, Y Yang, Z Wei, J Wu… - International Journal of …, 2021 - Springer
Data security is the focus of information security. As a primary method, file encryption is
adopted for ensuring data security. Encryption algorithms created to meet the Data …

[PDF][PDF] Text-based steganography using Huffman compression and AES encryption algorithm

RH Ali, JM Kadhim - Iraqi Journal of Science, 2021 - iasj.net
In every system of security, to keep important data confidential, we need a high degree of
protection. Steganography can be defined as a way of sending confidential texts through a …

DKEMA: GPU-based and dynamic key-dependent efficient message authentication algorithm

HN Noura, R Couturier, O Salman… - The Journal of …, 2022 - Springer
Recently, benefiting from the advancement in the Graphic Processing Unit (GPU)
technology, there is an increased interest in implementing and designing new efficient …

Fault Injection Attacks on Embedded Applications: Characterization and Evaluation

Z Kazemi - 2022 - theses.hal.science
The security assessment of IoT devices against potential software and hardware-based
threats is now a necessary task for embedded software developers. Having physical access …

GPU accelerated AES algorithm

C Wang, X Chu - arxiv preprint arxiv:1902.05234, 2019 - arxiv.org
It has been widely accepted that Graphics Processing Units (GPU) is one of promising
schemes for encryption acceleration, in particular, the support of complex mathematical …

Analysis of differential distribution of lightweight block cipher based on parallel processing on GPU

Z Chen, J Chen, W Meng, JS Teh, P Li, B Ren - Journal of Information …, 2020 - Elsevier
As the fast development of IoT technology, various security solutions have to be considered
when the corresponding solutions are being deployed. Due to the lightweight nature of the …

Enhancing the actual throughput of the AES algorithm on the Pascal GPU architecture

AA Abdelrahman, H Dahshan… - 2018 3rd International …, 2018 - ieeexplore.ieee.org
The Advanced Encryption Standard (AES) is strongly used in different security levels of data
communication as it has higher efficiency and stronger security compared with other …

Cryptography Core Implementation Starting From Open-Source RTL

T Margineanu, HR Enescu, CE Vasile… - 2024 International …, 2024 - ieeexplore.ieee.org
The chip shortage and demand for skilled workers have driven the adoption of open-source
tools and IP reuse in the industry. This paper presents the design and implementation of a …

Implementation of" Magma" and" Kuznyechik" ciphers using HIP

A Borisov, E Myasnikov - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
In this paper, we present an implementation of Russian cryptographic standards using HIP,
an open-source technology that allows writing a C++ code, which can be compiled for AMD …

Study and Evaluation of Novel Chaotic System Applied to Image Encryption with Security and Statistical Analyses

HAA Mansour, MM Fouad - … Methods: Proceedings of the 9th Computer …, 2020 - Springer
There is no doubt that chaotic sequences attracted much attention in recent decades due to
its distinctive properties. These distinct properties give the availability for the chaotic …