A survey on performance analysis of different architectures of AES algorithm on FPGA

T Hasija, A Kaur, KR Ramkumar, S Sharma… - … Electronics Devices and …, 2023 - Springer
Encryption is the primary way for ensuring communication security. The symmetric key
method, often known as Advanced Encryption Standard (AES), is a well-known technique in …

A comprehensive review about image encryption methods

C Tiken, R Samlı - Harran Üniversitesi Mühendislik Dergisi, 2022 - dergipark.org.tr
In today's technology world, data security has a great importance. Because each data type
has its own characteristics, there are various methods of providing this security. The main …

A novel ToCC map and two-level scrambling-based medical image encryption technique

S Pankaj, M Dua - Network Modeling Analysis in Health Informatics and …, 2021 - Springer
Since the past few decades, various methods for diagnosis of different diseases have been
introduced in the area of medical science. One such invention is the use of digital images to …

Modified AES cipher round and key schedule

EM De Los Reyes, AM Sison… - Indonesian Journal of …, 2019 - section.iaesonline.com
Abstract In this paper, Advanced Encryption Standard was modified to address the
lowdiffusion rate at the early rounds by adding additional primitive operationssuch as …

A secure key dependent dynamic substitution method for symmetric cryptosystems

A Ejaz, IA Shoukat, U Iqbal, A Rauf, A Kanwal - PeerJ Computer Science, 2021 - peerj.com
The biggest challenge for symmetric cryptosystems is to replace their static substitution with
dynamic substitution, because static substitution S-boxes make the symmetric block ciphers …

Chaos based Medical Image Encryption Techniques: A Comprehensive Review and Analysis

S Pankaj, M Dua - Information Security Journal: A Global …, 2024 - Taylor & Francis
In the past two decades, we have seen the proliferation of Internet and its applications. The
information exchange happens via images, videos, texts, audio clips, etc. Medical experts …

Comparative study of various cryptographic algorithms used for text, image, and video

N Advani, C Rathod, AM Gonsai - Emerging Trends in Expert Applications …, 2019 - Springer
In today's era of computer, the most important aspect for data is its security. This is very much
essential when the data is traveling through various mechanisms of wired and wireless …

Fast image encryption algorithm with random structures

T Etem, T Kaya - International Journal of Computers and …, 2023 - Taylor & Francis
Block encryption algorithms are among the most preferred applications in cryptographic
systems. Block ciphers should have accomplished some requirements for a secure …

Performance analysis of symmetric encryption algorithms for their encryption and decryption time

NA Advani, AM Gonsai - 2019 6th International Conference on …, 2019 - ieeexplore.ieee.org
In today's Internet, use of multimedia data has been increased like anything. Our data is
important so need to encrypt our data. For this we need various mechanisms for the same …

An Enhanced BlowFish (eBf) Algorithm for Securing x64FileMessage Content

GL Dulla, BD Gerardo… - 2018 IEEE 10th …, 2018 - ieeexplore.ieee.org
Security to information has tremendously changed the way computer and network
transactions performed. One of the methods to secure data is through encryption. Encryption …