Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments
JH Kong, LM Ang, KP Seng - Journal of Network and Computer …, 2015 - Elsevier
Modern cryptographic algorithms play an irreplaceable role in data communication systems
for various areas of applications. These algorithms are the backbone of data protection and …
for various areas of applications. These algorithms are the backbone of data protection and …
[KIRJA][B] Reconfigurable computing: Accelerating computation with field-programmable gate arrays
MB Gokhale, PS Graham - 2006 - books.google.com
A one-of-a-kind survey of the field of Reconfigurable Computing Gives a comprehensive
introduction to a discipline that offers a 10X-100X acceleration of algorithms over …
introduction to a discipline that offers a 10X-100X acceleration of algorithms over …
Secured flipped scan-chain model for crypto-architecture
G Sengar, D Mukhopadhyay… - IEEE Transactions on …, 2007 - ieeexplore.ieee.org
Scan chains are exploited to develop attacks on cryptographic hardware and steal
intellectual properties from the chip. This paper proposes a secured strategy to test designs …
intellectual properties from the chip. This paper proposes a secured strategy to test designs …
High-performance hardware implementation for RC4 stream cipher
RC4 is the most popular stream cipher in the domain of cryptology. In this paper, we present
a systematic study of the hardware implementation of RC4, and propose the fastest known …
a systematic study of the hardware implementation of RC4, and propose the fastest known …
[PDF][PDF] Energy, performance, area versus security trade-offs for stream ciphers
The goal of this submission is to provide a framework and platform to compare stream
ciphers not only on their security level but also based on their energy consumption …
ciphers not only on their security level but also based on their energy consumption …
An effective RC4 stream cipher
TDB Weerasinghe - 2013 IEEE 8th international conference on …, 2013 - ieeexplore.ieee.org
RC4 is the most widely used stream cipher around. A lot of modifications of RC4 cipher can
be seen in open literature. Most of them enhance the secrecy of the cipher and the security …
be seen in open literature. Most of them enhance the secrecy of the cipher and the security …
Implementation and evaluation of EMAES–A hybrid encryption algorithm for sharing multimedia files with more security and speed
R Somaiya, A Gonsai, R Tanna - International journal of electrical and …, 2023 - hrcak.srce.hr
Sažetak In this era of smartphones, a huge amount of multimedia files like audio, video,
images, animation, and plain text are shared. And with this comes the threat of data being …
images, animation, and plain text are shared. And with this comes the threat of data being …
[KIRJA][B] Statistical trend analysis of physically unclonable functions: An approach via text mining
Physically Unclonable Functions (PUFs) translate unavoidable variations in certain
parameters of materials, waves, or devices into random and unique signals. They have …
parameters of materials, waves, or devices into random and unique signals. They have …
Comparison of the hardware architectures and FPGA implementations of stream ciphers
MD Galanis, P Kitsos, G Kostopoulos… - Proceedings of the …, 2004 - ieeexplore.ieee.org
In this paper, the hardware implementations of five representative stream ciphers are
compared in terms of performance and consumed area. The ciphers used for the …
compared in terms of performance and consumed area. The ciphers used for the …
Effective uses of FPGAs for brute-force attack on RC4 ciphers
SHM Kwok, EY Lam - IEEE Transactions on Very Large Scale …, 2008 - ieeexplore.ieee.org
This paper presents an effective field-programmable gate array (FPGA)-based hardware
implementation of a parallel key searching system for the brute-force attack on RC4 …
implementation of a parallel key searching system for the brute-force attack on RC4 …