On the parameterized IP core design of the new cryptographic system

HC Chen, JC Yen, SM Wu… - … Symposium on Intelligent …, 2005 - ieeexplore.ieee.org
This paper is to investigate how we efficiently realize a real-time encryption and decryption
system for data transmission and storage in the applications with different requirements …

[Retracted] Application of Information Encryption Technology in Computer Network Communication Security

H Zhang - Wireless Communications and Mobile Computing, 2022 - Wiley Online Library
In order to improve the communication efficiency while ensuring the security of
communication information, this paper proposes a design and research method of a …

[Retracted] Encryption Technology for Computer Network Data Security Protection

Y Yu - Security and Communication Networks, 2022 - Wiley Online Library
In order to solve the network security problem of data encryption technology, this paper
proposes a research method of computer network information security maintenance based …

[引用][C] Network security using cryptographic techniques

S Kaushik, A Singhal - International Journal of Advanced Research in …, 2012

[PDF][PDF] Advanced encryption standard/rijndael ip core

R Usselmann - 2007-08-20]. http://www, opencores, org/projects, cgi …, 2002 - uji.es
AES Rijndael IP Core Page 1 Advanced Encryption Standard / Rijndael IP Core Author: Rudolf
Usselmann rudi@asics.ws www.asics.ws Rev. 1.1 November 12, 2002 Page 2 Revision …

3D CUBE algorithm for the key generation method: Applying deep neural network learning-based

J Jin, K Kim - IEEE Access, 2020 - ieeexplore.ieee.org
Current encryption systems are run with a hybrid mode in which symmetric and asymmetric
key methods are mixed. This hybrid mode is devised to employ the fast processing speed of …

5G Wireless Communication Network Security System Encryption based on DES Algorithm

J Li - 2022 IEEE 2nd International Conference on Electronic …, 2022 - ieeexplore.ieee.org
With the rapid development of Internet technology and the enrichment of Internet of Things
services, wireless communication networks have developed into more efficient, lower …

The application of data encryption technology in computer network communication security

G Liu - Mobile Information Systems, 2022 - Wiley Online Library
With the development of computer network and the popularization of information system, the
security of databases, as platforms for centralized storage and sharing of information system …

CryptoCliqIn: graph-theoretic cryptography using clique injection

S Swain, D Puthal, E Bertino - IEEE Intelligent Systems, 2021 - ieeexplore.ieee.org
Because encryption is a fundamental security building block, existing encryption techniques
like AES, Twofish, Blowfish, and Triple DES are constantly under the threat of being …

A table-based end to end encryption technique without key exchange

AB Srinivasan, S Hemalatha - Engineered Science, 2022 - espublisher.com
Communication has become an integral part of all beings—both the living and non-living. In
most cases, everyone likes to keep their communication personal and secure. Additionally …