Accelerating DES and AES algorithms for a heterogeneous many-core processor
B **ng, DD Wang, Y Yang, Z Wei, J Wu… - International Journal of …, 2021 - Springer
Data security is the focus of information security. As a primary method, file encryption is
adopted for ensuring data security. Encryption algorithms created to meet the Data …
adopted for ensuring data security. Encryption algorithms created to meet the Data …
[PDF][PDF] Text-based steganography using Huffman compression and AES encryption algorithm
In every system of security, to keep important data confidential, we need a high degree of
protection. Steganography can be defined as a way of sending confidential texts through a …
protection. Steganography can be defined as a way of sending confidential texts through a …
DKEMA: GPU-based and dynamic key-dependent efficient message authentication algorithm
Recently, benefiting from the advancement in the Graphic Processing Unit (GPU)
technology, there is an increased interest in implementing and designing new efficient …
technology, there is an increased interest in implementing and designing new efficient …
Fault Injection Attacks on Embedded Applications: Characterization and Evaluation
Z Kazemi - 2022 - theses.hal.science
The security assessment of IoT devices against potential software and hardware-based
threats is now a necessary task for embedded software developers. Having physical access …
threats is now a necessary task for embedded software developers. Having physical access …
GPU accelerated AES algorithm
It has been widely accepted that Graphics Processing Units (GPU) is one of promising
schemes for encryption acceleration, in particular, the support of complex mathematical …
schemes for encryption acceleration, in particular, the support of complex mathematical …
Analysis of differential distribution of lightweight block cipher based on parallel processing on GPU
As the fast development of IoT technology, various security solutions have to be considered
when the corresponding solutions are being deployed. Due to the lightweight nature of the …
when the corresponding solutions are being deployed. Due to the lightweight nature of the …
Enhancing the actual throughput of the AES algorithm on the Pascal GPU architecture
The Advanced Encryption Standard (AES) is strongly used in different security levels of data
communication as it has higher efficiency and stronger security compared with other …
communication as it has higher efficiency and stronger security compared with other …
Cryptography Core Implementation Starting From Open-Source RTL
T Margineanu, HR Enescu, CE Vasile… - 2024 International …, 2024 - ieeexplore.ieee.org
The chip shortage and demand for skilled workers have driven the adoption of open-source
tools and IP reuse in the industry. This paper presents the design and implementation of a …
tools and IP reuse in the industry. This paper presents the design and implementation of a …
Implementation of" Magma" and" Kuznyechik" ciphers using HIP
In this paper, we present an implementation of Russian cryptographic standards using HIP,
an open-source technology that allows writing a C++ code, which can be compiled for AMD …
an open-source technology that allows writing a C++ code, which can be compiled for AMD …
Study and Evaluation of Novel Chaotic System Applied to Image Encryption with Security and Statistical Analyses
HAA Mansour, MM Fouad - … Methods: Proceedings of the 9th Computer …, 2020 - Springer
There is no doubt that chaotic sequences attracted much attention in recent decades due to
its distinctive properties. These distinct properties give the availability for the chaotic …
its distinctive properties. These distinct properties give the availability for the chaotic …