PERBANDINGAN KONSUMSI ENERGI ALGORITMA AES (256 BIT) DAN TWOFISH (256 BIT) PADA PONSEL BERBASIS ANDROID

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Dedicated 256-Bit Hash Function: FORK-256

This paper describes a new software-efficient 256-bit hash function, FORK-256. Recently proposed attacks on MD5 and SHA-1 motivate a new hash function design. It is designed not only to have higher security but also to be faster than SHA-256. The performance of the new hash function is at least 30% better than that of SHA-256 in software. And it is secure against any known cryptographic attacks...

متن کامل

NESHA-256, NEw 256-bit Secure Hash Algorithm (Extended Abstract)

In this paper, we introduce a new dedicated 256-bit hash function: NESHA-256. The recently contest for hash functions held by NIST, motivates us to design the new hash function which has a parallel structure. Advantages of parallel structures and also using some ideas from the designing procedure of block-cipher-based hash functions strengthen our proposed hash function both in security and in ...

متن کامل

5 a Novel 256 - Bit Block Cipher

Tornado is a novel 256-bit block cipher that accepts a variablelength key up to 256 bits. The proposed cipher was built on an idea which gives it a dynamic nature. This nature means that the cipher execution flow varies according to the user’s input key. The confusion and diffusion processes are performed based on 10 round functions named “Storm-functions”. A selection and reordering operations...

متن کامل

BLAKE and 256-bit advanced vector extensions

Intel recently documented its AVX2 instruction set extension that introduces support for 256-bit wide single-instruction multiple-data (SIMD) integer arithmetic over double (32-bit) and quad (64-bit) words. This will enable Intel’s future processors—starting with the Haswell architecture, to be released in 2013—to fully support 4-way SIMD com­ putation of 64-bit ARX algorithms (32-bit is alread...

متن کامل

Comparison of 256-bit stream ciphers

This paper evaluates and compares several stream ciphers that use 256-bit keys: counter-mode AES, CryptMT, DICING, Dragon, Fubuki, HC-256, Phelix, Py, Py6, Salsa20, SOSEMANUK, VEST, and YAMB.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electro Luceat

سال: 2015

ISSN: 2597-4467,2527-4724

DOI: 10.32531/jelekn.v1i1.13