[HTML][HTML] Hybrid pipeline hardware architecture based on error detection and correction for aes

I Algredo-Badillo, KA Ramírez-Gutiérrez… - Sensors, 2021 - mdpi.com
… A hardware implementation of the Advanced Encryptionprocesses need analysis and
design evaluations, motivating the present research to solve the detection and correction of errors

Analysis and design of file security system AES (advanced encryption standard) cryptography based

K Muttaqin, J Rahmadoni - Journal of Applied Engineering and …, 2020 - journal.yrpipku.com
… , where the encryption and decryption process is carried out on the file. In testing the system
… For that we need a process of encryption (encryption and decryption) of the data sent which …

A persistent fault-based collision analysis against the advanced encryption standard

S Zheng, X Liu, S Zang, Y Deng… - … -Aided Design of …, 2021 - ieeexplore.ieee.org
… the detailed steps of our PFCA against AES in Section II. Afterward, the complexity of the
attack is presented in Section III. We explain the concept of rear-round collisions and analyze its …

[PDF][PDF] A survey on advanced encryption standard

SK Rao, D Mahto, DA Khan - International Journal of Science and …, 2017 - researchgate.net
… This paper depicts all the valuable work done on the Advanced Encryption Standard since it
… are specified repeated steps involved in the each round of encryption and inverse steps are …

[HTML][HTML] Error analysis and detection procedures for elliptic curve cryptography

NF Saudy, IA Ali, R Al Barkouky - Ain Shams Engineering Journal, 2019 - Elsevier
methods. This is primarily as a result of the software as well as hardware implementations as
it is cipher methods … Side channels allow analyzing the time consumed by the operators [2], […

Hardware constructions for error detection in lightweight authenticated cipher ASCON benchmarked on FPGA

J Kaur, MM Kermani… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
error detection schemes for the non-linear S-Box of the ASCON’s lightweight authenticated
cipher vari… lightweight cryptography standardization process,” US Dept. Commerce, Nat. Inst. …

Problems of the advanced encryption standard in protecting Internet of Things sensor networks

P Arpaia, F Bonavolonta, A Cioffi - Measurement, 2020 - Elsevier
… In this section, a procedure for testing the vulnerability of a generic IoT microcontroller,
secured by the protection standard AES-128 is proposed. To this aim, two attack variants, without …

[PDF][PDF] A survey and analysis of the image encryption methods

OF Mohammad, MSM Rahim… - International Journal of …, 2017 - academia.edu
… other during the encryption process. Practically, the vast majority of block ciphers are
either have a block length of 128 bits (16 bytes) such as the advanced encryption standard (AES), …

A framework to counter statistical ineffective fault analysis of block ciphers using domain transformation and error correction

S Saha, D Jap, DB Roy, A Chakraborty… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
… a hardware implementation of our algorithm (realized on a SASABO-GII FPGA platform). We
moved to hardware … His research interests include formal methods and hardware security. …

Image encryption method based on improved ECC and modified AES algorithm

A Hafsa, A Sghaier, J Malek, M Machhout - Multimedia Tools and …, 2021 - Springer
Advanced Encryption Standard (AES) - Elliptic Curve Cryptography (ECC) for medical image
encryption… This token was transferred to the other part, and the data encryption process was …