A Review Paper on Comparative Study of FPGA Implemented AES, Rijndael AES and Pipelined AES Algorithms for Secure Adhoc Networks
نویسندگان
چکیده
منابع مشابه
Rijndael for AES
In this document we give a short overview of the reasons why Rijndael should be selected as the AES. We have divided our arguments into four categories: • Security: Rijndael has the same objective security level as the other finalists, and can easily be implemented in a secure way. • Efficiency: Rijndael has a large "performance margin" compared to the other candidates. • Design philosophy: The...
متن کاملRijndael: beyond the AES
In October 2001, after a 3-year evaluation process, NIST announced its decision to propose the Belgian algorithm Rijndael for the AES. In this paper, we discuss some of the work that has been done on Rijndael since its selection as the AES. We also outline briefly the design of a related cipher, called Anubis, and compare both designs.
متن کاملAES Proposal: Rijndael
After the selection of Rijndael as the AES, it was decided to change the names of some of its component functions in order to improve the readability of the standard. However, we see that many recent publications on Rijndael and the AES still use the old names, mainly because the original submission documents using the old names, are still available on the Internet. In this note we repeat quick...
متن کاملSecure Multiparty AES (short paper)
We propose several variants of a secure multiparty computation protocol for AES encryption. The best variant requires 2200 + 400 255 expected elementary operations in expected 70 + 20 255 rounds to encrypt one 128-bit block with a 128-bit key. We implemented the variants using VIFF, a software framework for implementing secure multiparty computation (MPC). Tests with three players (passive secu...
متن کاملSecure Multiparty AES (full paper)
We propose several variants of a secure multiparty computation protocol for AES encryption. The best variant requires 2200 + 400 255 expected elementary operations in expected 70 + 20 255 rounds to encrypt one 128-bit block with a 128-bit key. We implemented the variants using VIFF, a software framework for implementing secure multiparty computation (MPC). Tests with three players (passive secu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY
سال: 2014
ISSN: 2278-5612
DOI: 10.24297/ijmit.v9i3.658