نتایج جستجو برای: aes 128

تعداد نتایج: 29461  

1999
Suresh Chari Charanjit Jutla Josyula R. Rao Pankaj Rohatgi

NIST has considered the performance of AES candidates on smart-cards as an important selection criterion and many submitters have highlighted the compactness and e ciency of their submission on low end smart cards. However, in light of recently discovered power based attacks, we strongly argue that evaluating smart-card suitability of AES candidates requires a very cautious approach. We demonst...

1999
Suresh Chari Charanjit Jutla Josyula R. Rao Pankaj Rohatgi

NIST has considered the performance of AES candidates on smart-cards as an important selection criterion and many submitters have highlighted the compactness and eeciency of their submission on low end smart cards. However, in light of recently discovered power based attacks, we strongly argue that evaluating smart-card suitability of AES candidates requires a very cautious approach. We demonst...

2012
Patrick Derbez Pierre-Alain Fouque Jérémy Jean

In this paper, we study the AES block cipher in the chosen-key setting. The adversary’s goal of this security model is to find triplets (m,m′, k) satisfying some properties more efficiently for the AES scheme than generic attacks. It is a restriction of the classical chosen-key model, since as it has been defined originally, differences in the keys are possible. This model is related to the kno...

Journal: :RFC 2004
Uri Blumenthal Fabio Maino Keith McCloghrie

This document describes a symmetric encryption protocol that supplements the protocols described in the User-based Security Model (USM), which is a Security Subsystem for version 3 of the Simple Network Management Protocol for use in the SNMP Architecture. The symmetric encryption protocol described in this document is based on the Advanced Encryption Standard (AES) cipher algorithm used in Cip...

Journal: :International Journal of Reconfigurable and Embedded Systems (IJRES) 2012

2014
R. Seelanand Kumar V. Viswanadha

a proposed FPGA-based implementation of the Advanced Encryption Standard (AES) algorithm is presented in this paper. This implementation is compared with other works to show the efficiency. The design uses an iterative looping approach with block and key size of 128 bits, lookup table implementation of S-box. This gives low complexity architecture and easily achieves low latency as well as high...

Journal: :Baghdad Science Journal 2023

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. combination strengthens the proposed W-method by generating high randomized Two points can represent reliability of any technique. Firstly, is key generation; therefore, our approach merges 64 bits with AES produce 128 as root for all remaining keys that are 15. complexity...

2005
Li An-Ping

In this paper, we will propose a new synchronous stream cipher named DICING, which can be taken as a clock-controlled one but with a new mechanism of altering steps. With the simple construction, DICING has satisfactory performance, faster than AES about two times. For the security, there have not been found weakness for the known attacks, the key sizes can be 128 bits and 256 bits respectively.

Journal: :I. J. Network Security 2009
Somanath Tripathy Sukumar Nandi

We propose a lightweight block cipher that supports 128bit block size with 128-, 192and 256-bit keys, to confirm with the Advanced Encryption Standard (AES) specification. All components of LCASE are chosen to be cellular automata-based so as to achieve higher parallelism and simplify the implementation. Apart from that, the other virtues of LCASE are its high speed and cheap cost along with be...

2004
U. Blumenthal F. Maino

This document describes a symmetric encryption protocol that supplements the protocols described in the User-based Security Model (USM), which is a Security Subsystem for version 3 of the Simple Network Management Protocol for use in the SNMP Architecture. The symmetric encryption protocol described in this document is based on the Advanced Encryption Standard (AES) cipher algorithm used in Cip...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید