A voltage regulator-assisted lightweight AES implementation against DPA attacks
In this paper, the mathematical foundations of the security implications of utilizing various on-
chip voltage converters as a countermeasure against differential power analysis (DPA) …
chip voltage converters as a countermeasure against differential power analysis (DPA) …
[PDF][PDF] Design and implementation of pipelined and parallel AES encryption systems using FPGA
The information security is one of the most important issues in the design of any
communication network. One of the most common encryption algorithms is the Advanced …
communication network. One of the most common encryption algorithms is the Advanced …
[PDF][PDF] Implementation and performance analysis of AES-128 cryptography method in an NFC-based communication system
R Ratnadewi, RP Adhie, Y Hutama… - World Trans. Eng …, 2017 - researchgate.net
In this computer and Internet era, the cryptography method is commonly used to create
secure communications between two or more parties. A message sent via computer can be …
secure communications between two or more parties. A message sent via computer can be …
The design of a high-throughput hardware architecture for the AES-GCM algorithm
MB Lin, JH Chuang - IEEE Transactions on Consumer …, 2023 - ieeexplore.ieee.org
This paper proposes the hardware architecture capable of processing the AES-GCM
algorithm in parallel and pipeline. To boost the hardware efficiency, two parallel AES …
algorithm in parallel and pipeline. To boost the hardware efficiency, two parallel AES …
High-throughput low-area design of AES using constant binary matrix-vector multiplication
In spite of many outstanding studies, the hardware implementation of Advanced Encryption
Standard (AES) algorithm is still challenging because of recurrent computations in Galois …
Standard (AES) algorithm is still challenging because of recurrent computations in Galois …
Securing Infrared Communication in Nuclear Power Plants: Advanced Encryption for Infrared Sensor Networks
This study enhances infrared communication security in nuclear power plants' secondary
systems, addressing the risk of mechanical and cyber failures. A novel random address …
systems, addressing the risk of mechanical and cyber failures. A novel random address …
Design of leakage resilient and DPA attack immune architecture of S BOX
Electronic gadgets such as mobile phones, laptops, IPad, home appliances and other
gaming gadgets have become a part and parcel of our life and they have made the human …
gaming gadgets have become a part and parcel of our life and they have made the human …
[PDF][PDF] Design and implementation of pipelined aes encryption system using FPGA
Nowadays, the data encryption became very important because of the usage of the data
transmission in all the filed. The Advanced Encryption Standard (AES) that known as …
transmission in all the filed. The Advanced Encryption Standard (AES) that known as …
Bump in the wire (BITW) security solution for a marine ROV remote control application
The work presented here describes a Bump-In-The-Wire (BITW) security solution for the
provision of secure communications for a Marine ROV Control Application. The targeted …
provision of secure communications for a Marine ROV Control Application. The targeted …
Maintaining Secure Level on Symmetric Encryption under Quantum Attack
Quantum computing is currently being researched in many countries, and if implemented in
the near future, it may pose a threat to existing encryption standards. In the quantum …
the near future, it may pose a threat to existing encryption standards. In the quantum …