Symmetric key algorithm in computer security: a review

R Anusha, MJD Kumar, VS Shetty… - 2020 4th International …, 2020 - ieeexplore.ieee.org
The primary objective of any computer security algorithm is that the untrusted third party
should not be able to read or gain knowledge about the data being communicated or stored …

VHDL based Blowfish implementation for secured embedded system design

IA Landge, BK Mishra - 2017 Third International Conference on …, 2017 - ieeexplore.ieee.org
Embedded devices are becoming more popular and used in network communications.
These devices are now used commonly for storing data and exchange of data through …

Hardware based MD5 implementation using VHDL for secured embedded and VLSI based designs

IA Landge, BK Mishra - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
Many modern electronic systems like PDAs, cell phones, network routers, smart cards, and
networked sensors are in need to access, store, manipulate, or communicate sensitive …