VLSI architecture of S-box with high area efficiency based on composite field arithmetic

YT Teng, WL Chin, DK Chang, PY Chen… - IEEE Access, 2021 - ieeexplore.ieee.org
This work aims at optimizing the hardware implementation of the SubBytes and inverse
SubBytes operations in the advanced encryption standard (AES). To this, the composite field …

A survey of trusted computing solutions using FPGAS

PD Rosero-Montalvo, Z István, W Hernandez - IEEE Access, 2023 - ieeexplore.ieee.org
Ensuring the security and privacy of computation and data management in the cloud and
edge is an ever-important requirement. There are several working solutions today for trusted …

A dual mode self-test for a stand alone AES core

FS Hossain, TH Sakib, M Ashar, R Ferdian - Plos one, 2021 - journals.plos.org
Advanced Encryption Standard (AES) is the most secured ciphertext algorithm that is
unbreakable in a software platform's reasonable time. AES has been proved to be the most …

Hardware Implementation of Effective Framework for the Trade-off between Security and QoS in Wireless Sensor Networks

MS Abdul-Karim, KH Rahouma, K Nasr - Microprocessors and …, 2022 - Elsevier
The trade-off between security and quality of service (QoS) in wireless networks has
attracted great attention in recent years. This paper presents a hardware implementation of a …

Defense in depth approach on AES cryptographic decryption core to enhance reliability

G Yendamury, N Mohankumar - 2021 IEEE International IOT …, 2021 - ieeexplore.ieee.org
Security is need of the hour in today's world since the cyber physical systems are prone to
malicious attacks. Advanced Encryption Standard is a cryptographic algorithm which is …

Design of a BIST implemented AES crypto-processor ASIC

ML Ali, MS Rahman, FS Hossain - Plos one, 2021 - journals.plos.org
This paper presents the design of a Built-in-self-Test (BIST) implemented Advanced
Encryption Standard (AES) cryptoprocessor Application Specific Integrated Circuit (ASIC) …

Secure Data Transmission using Hybrid Crypto Processor based on AES and HMAC Algorithms

S Umamaheswari, NR Vishal… - … on Advancements in …, 2023 - ieeexplore.ieee.org
In today's digital age, vulnerabilities in digital platforms have become a major concern, as
cyber-attacks can lead to significant financial losses and privacy breaches. Encryption and …

A survey on security concerns and their actual solutions for using FPGAs in cloud computing

PD Rosero-Montalvo - 2021 IEEE Latin American Conference …, 2021 - ieeexplore.ieee.org
Nowadays, FPGAs are essential tools for hardware accelerations in Cloud computing.
However, a traditional architecture FPGA is still single-tenant, and the increasing demand for …

Patient Health Information Framework Using AWS S3 Service

HM Prajwal, S Shankaraiah… - 2022 IEEE 2nd Mysore …, 2022 - ieeexplore.ieee.org
The Health Information Exchange (HIE) expresses the incredible convenience of patient
care for better health care and more integrated care. The National Information Coordinator's …

On-the-fly key generation based VLSI implementation of advanced encryption standard

S Valasa, S Avunoori, JR Shinde - 2021 6th International …, 2021 - ieeexplore.ieee.org
Data transmitted in a digital format is vulnerable to breaches. Here, the FPGA-based
Advanced Encryption Standard (AES) architecture is proposed to safeguard high speed …