A voltage regulator-assisted lightweight AES implementation against DPA attacks

W Yu, S Köse - IEEE Transactions on Circuits and Systems I …, 2016 - ieeexplore.ieee.org
In this paper, the mathematical foundations of the security implications of utilizing various on-
chip voltage converters as a countermeasure against differential power analysis (DPA) …

[PDF][PDF] Design and implementation of pipelined and parallel AES encryption systems using FPGA

M Nabil, AAM Khalaf, SM Hassan - Indones. J. Electr. Eng. Comput …, 2020 - academia.edu
The information security is one of the most important issues in the design of any
communication network. One of the most common encryption algorithms is the Advanced …

[PDF][PDF] Implementation and performance analysis of AES-128 cryptography method in an NFC-based communication system

R Ratnadewi, RP Adhie, Y Hutama… - World Trans. Eng …, 2017 - researchgate.net
In this computer and Internet era, the cryptography method is commonly used to create
secure communications between two or more parties. A message sent via computer can be …

The design of a high-throughput hardware architecture for the AES-GCM algorithm

MB Lin, JH Chuang - IEEE Transactions on Consumer …, 2023 - ieeexplore.ieee.org
This paper proposes the hardware architecture capable of processing the AES-GCM
algorithm in parallel and pipeline. To boost the hardware efficiency, two parallel AES …

High-throughput low-area design of AES using constant binary matrix-vector multiplication

H Lee, Y Paik, J Jun, Y Han, SW Kim - Microprocessors and Microsystems, 2016 - Elsevier
In spite of many outstanding studies, the hardware implementation of Advanced Encryption
Standard (AES) algorithm is still challenging because of recurrent computations in Galois …

Securing Infrared Communication in Nuclear Power Plants: Advanced Encryption for Infrared Sensor Networks

TJ Park, K Kim, S Moon - Sensors, 2024 - mdpi.com
This study enhances infrared communication security in nuclear power plants' secondary
systems, addressing the risk of mechanical and cyber failures. A novel random address …

Design of leakage resilient and DPA attack immune architecture of S BOX

C Padmini, JVR Ravindra - 2021 6th International Conference …, 2021 - ieeexplore.ieee.org
Electronic gadgets such as mobile phones, laptops, IPad, home appliances and other
gaming gadgets have become a part and parcel of our life and they have made the human …

[PDF][PDF] Design and implementation of pipelined aes encryption system using FPGA

M Nabil, AAM Khalaf, SM Hassan - International Journal of Recent …, 2020 - academia.edu
Nowadays, the data encryption became very important because of the usage of the data
transmission in all the filed. The Advanced Encryption Standard (AES) that known as …

Bump in the wire (BITW) security solution for a marine ROV remote control application

M Rao, T Newe, E Omerdic, A Kaknjo… - Journal of information …, 2018 - Elsevier
The work presented here describes a Bump-In-The-Wire (BITW) security solution for the
provision of secure communications for a Marine ROV Control Application. The targeted …

Maintaining Secure Level on Symmetric Encryption under Quantum Attack

HJ Shiu, CT Yang, YR Tsai, WC Lin, CM Lai - Applied Sciences, 2023 - mdpi.com
Quantum computing is currently being researched in many countries, and if implemented in
the near future, it may pose a threat to existing encryption standards. In the quantum …