AAβ public key cryptosystem - A comparative analysis against RSA and ECC

MRK Ariffin, Z Mahad - 2012 7th International Conference on …, 2012 - ieeexplore.ieee.org
This paper aims to provide a comparative analysis between probabilistic and deterministic
security models. We provide a benchmark by practically implementing and comparing three …

[PDF][PDF] Performance Analysis of Secure Integrated Circuits using Blowfish Algorithm

VK Swamy, GB Dr Prabhu - Global Journal of Computer Science …, 2013 - researchgate.net
Auroras Engineering College, India Abstract-Security is an essential feature of Information
Communication Technology (ICT). Information has to be encrypted at the transmitter side to …

Implementation and optimization of a biometric cryptosystem using iris recognition

C McGuffey, C Liu, S Schuckers - Biometric and Surveillance …, 2015 - spiedigitallibrary.org
Protecting data is a critical part of life in the modern world. The science of protecting data,
known as cryptography, makes use of secret keys to encrypt data in a format that is not …

[PDF][PDF] High-performance implementation and evaluation of blowfish cryptographic algorithm on single-chip cloud computer: a pipelined approach

K Ebadi, V Pena, C Liu - UbiComp (IJU), 2012 - academia.edu
In the era of modern data communications, as the need for data security arises, the need to
reduce the execution time and computation overhead associated with the execution of …

[PDF][PDF] Improve high-performance by using of blowfish cryptographic algorithm on single-chip cloud computer

M Kumar, M Sundharajan - Indian Journal …, 2016 - sciresol.s3.us-east-2.amazonaws …
Objectives: In the innovation of current data correspondences, the requirement for data well
being emerges to make the execution time and calculation overhead less connected with …

Multi-core approach towards efficient biometric cryptosystems

C McGuffey, C Liu - 2015 44th International Conference on …, 2015 - ieeexplore.ieee.org
Protecting data is a critical part of life in the modern world. The science of protecting data,
known as cryptography, makes use of secret keys to encrypt data in a format that is not …

Hardware Accelerator Approach Towards Efficient Biometric Cryptosystems for Network Security

C McGuffey, C Liu, S Schuckers - Journal of computing and …, 2015 - hrcak.srce.hr
Sažetak Protecting data and its communication is a critical part of the modern network. The
science of protecting data, known as cryptography, uses secret keys to encrypt data in a …

[PDF][PDF] PARC4-I: Parallel Implementation of Enhanced Rc4a Using Pascs And Loop Unrolling Mechanism

D Handa, B Kapoor - Computer Applications: An International …, 2015 - researchgate.net
In today's network-based cloud computing era, software applications are playing big role.
The security of these software applications is paramount to the successful use of these …

Introducing the extremely heterogeneous architecture

S Liu, WW Ro, C Liu, A Cristobal-Salas… - Journal of …, 2012 - World Scientific
The computer industry is moving towards two extremes: extremely high-performance high-
throughput cloud computing, and low-power mobile computing. Cloud computing, while …

Modern Crypto Systems in Next Generation Networks: Issues and Challenges

RC Biradar, RJ Nayaka - Handbook of Research on Digital Crime …, 2015 - igi-global.com
Abstract The performance of Next Generation Networks (NGN) in terms of security, speed,
synchronization, latency, and throughput with variable synchronous or asynchronous packet …