Method and apparatus for cryptographically processing data
M Watanabe - US Patent 8,983,061, 2015 - Google Patents
(57) ABSTRACT A method and apparatus cryptographically process data including a
plurality of data segments. The cryptographic process includes (a) receiving a plurality of …
plurality of data segments. The cryptographic process includes (a) receiving a plurality of …
Implementation of non-pipelined and pipelined data encryption standard (des) using xilinx virtex-6 fpga technology
S Taherkhani, E Ever… - 2010 10th IEEE …, 2010 - ieeexplore.ieee.org
Data encryption process can easily be quite complicated and usually requires significant
computation time and power despite significant simplifications. This paper discusses about …
computation time and power despite significant simplifications. This paper discusses about …
Image Security Using Triple DES and DES Algorithms
S Sakthipriya, R Naresh - 2023 3rd Asian Conference on …, 2023 - ieeexplore.ieee.org
Data is always the source of all information and must be more secured at all cost.
Cryptography helps in preventing data from outer malicious attacks while it is transferred …
Cryptography helps in preventing data from outer malicious attacks while it is transferred …
A simplified FPGA implementation based on an Improved DES algorithm
L Fu, M Pan - 2009 Third International Conference on Genetic …, 2009 - ieeexplore.ieee.org
Recently, DES has been the most widely used symmetric block cipher for information
security. But many powerful attacks, such as differential attack and linear attack had been …
security. But many powerful attacks, such as differential attack and linear attack had been …
[HTML][HTML] High-throughput and area-efficient FPGA implementations of data encryption standard (DES)
One of the most popular standards for protecting confidential information is the Data
Encryption Standard (DES). Although it has been replaced by the Advanced Encryption …
Encryption Standard (DES). Although it has been replaced by the Advanced Encryption …
Risk Assessment of the 3Des in ERTMS
F Pépin, MG Vigliotti - International Conference on Reliability, Safety and …, 2016 - Springer
Abstract The three-key Triple Data Encryption Algorithm (Triple Data Encryption Algorithm is
also known in the literature as Triple-Des, or Triple DEA or TDEA)(3Des) is a symmetric …
also known in the literature as Triple-Des, or Triple DEA or TDEA)(3Des) is a symmetric …
[PDF][PDF] A technique for data encryption and decryption
P Srinivasarao, PV Lakshmipriya, PCS Azad… - International journal of …, 2014 - Citeseer
A day-to-day use of cryptography in our life is increasing tremendously; this is because of
necessity of our multimedia documents to be protected from unauthorized person. As the …
necessity of our multimedia documents to be protected from unauthorized person. As the …
The improved public key encryption algorithm of Kerberos protocol based on braid groups
K Jia, X Chen, G Xu - 2008 4th International Conference on …, 2008 - ieeexplore.ieee.org
Since the limitations of Kerberos authentication protocol for symmetric algorithm, there are
many improved Kerberos protocol of RSA public key encryptions. However, the existing …
many improved Kerberos protocol of RSA public key encryptions. However, the existing …
Design of High Performance Pipelined Data Encryption Standard (DES) Using **linx Virtex-6 FPGA Technology
SB Sridevi, BA Himabindu - The International Journal of …, 2014 - search.proquest.com
This paper describes the design of high performance data encryption process is a
predominant symmetric-key algorithm for the encryption of electronic data. It was highly …
predominant symmetric-key algorithm for the encryption of electronic data. It was highly …
[PDF][PDF] Analysis and Implementation of DES Using FPGA
Secure communication is the prime requirement of every organization. In today's world the
security has became the major aspect of life. It can be achieved by various techniques such …
security has became the major aspect of life. It can be achieved by various techniques such …