To see the other types of publications on this topic, follow the link: Advance Encryption Standard.

Dissertations / Theses on the topic 'Advance Encryption Standard'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Advance Encryption Standard.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Chieco, Davide. "L'algoritmo advanced encryption standard (AES)." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/7274/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Maurer, Jennifer (Jennifer Robin) 1979. "Hardware implementation of the Advanced Encryption Standard." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/29732.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2003.<br>Includes bibliographical references (leaves 97-98).<br>This project implements a hardware solution to the Advanced Encryption Standard (AES) algorithm and interfaces to IBM's CoreConnect Bus Architecture. The project is IBM SoftCore compliant, is synthesized to the .18 micron CMOS double-well technology, runs at 133 MHz, and is approximately 706K for the 16x128 bit buffer implementation and 874K gates for the 32x128 bit buffer implementation. Data can be encrypted and decrypte
APA, Harvard, Vancouver, ISO, and other styles
3

Loban, H. "A VHDL Implemetation of the Advanced Encryption Standard." Thesis, NURE, MC&FPGA, 2019. https://mcfpga.nure.ua/conf/2019-mcfpga/10-35598-mcfpga-2019-014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sampath, Sowrirajan. "FPGA based Hardware Implementation of Advanced Encryption Standard." Wright State University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=wright1189835736.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jolfaei, Alireza. "Robust Encryption Schemes for 3D Content Protection." Thesis, Griffith University, 2016. http://hdl.handle.net/10072/367353.

Full text
Abstract:
Since the 1970s, a large number of encryption schemes have been proposed, among which some have been standardised and widely adopted all over the world, such as data encryption standard (DES) and advanced encryption standard (AES). However, due to the special features of three-dimensional (3D) content, these encryption standards are not a suitable solution for 3D ap- plications. The problem of 3D content encryption is beyond the application of established and well-known encryption algorithms. This is primarily due to the structure of 3D content and the way it is used commercially. Unlike data
APA, Harvard, Vancouver, ISO, and other styles
6

Mantzouris, Panteleimon. "Computational algebraic attacks on the Advanced Encryption Standard (AES)." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FMantzouris.pdf.

Full text
Abstract:
Thesis (M.S. in Electrical Engineering and M.S.in Applied Mathematics)--Naval Postgraduate School, September 2009.<br>Thesis Advisor(s): Canright, David ; Butler, Jon. "September 2009." Description based on title screen as viewed on 5 November 2009. Author(s) subject terms: Advanced Encryption Standard (AES), Rijndael's algorithm, block cipher, decipher, round of the algorithm, sparse multivariate polynomial. Includes bibliographical references (p. 101). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
7

Kosaraju, Naga M. "A VLSI Architecture for Rijndael, the Advanced Encryption Standard." [Tampa, Fla.] : University of South Florida, 2003. http://purl.fcla.edu/fcla/etd/SFE0000163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schramm, Kai. "Advanced methods in Side Channel Cryptanalysis /." Berlin : Europäischer Univ.-Verl. [u.a.], 2006. http://deposit.d-nb.de/cgi-bin/dokserv?id=2902853&prov=M&dok_var=1&dok_ext=htm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tandon, Prateek. "High-performance advanced encryption standard (AES) security co-processor design." Thesis, Available online, Georgia Institute of Technology, 2004:, 2003. http://etd.gatech.edu/theses/available/etd-04082004-180433/unrestricted/tandon%5fprateek%5f200312%5fms.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Manteena, Rajender. "A VHDL implementation of the Advanced Encryption Standard-Rijndael Algorithm." [Tampa, Fla.] : University of South Florida, 2004. http://purl.fcla.edu/fcla/etd/SFE0000296.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Manteena, Rajender. "A VHDL Implemetation of the Advanced Encryption Standard-Rijndael Algorithm." Scholar Commons, 2004. https://scholarcommons.usf.edu/etd/1149.

Full text
Abstract:
The National Institute of Standards and Technology (NIST) has initiated a process to develop a Federal information Processing Standard (FIPS) for the Advanced Encryption Standard (AES), specifying an Advanced Encryption Algorithm to replace the Data Encryption standard (DES) the Expired in 1998. NIST has solicited candidate algorithms for inclusion in AES, resulting in fifteen official candidate algorithms of which Rijndael was chosen as the Advanced Encryption Standard. The Advanced Encryption Standard can be programmed in software or built with pure hardware. However Field Programmable Gate
APA, Harvard, Vancouver, ISO, and other styles
12

Basavarasu, Srinivasa R. "Voice and Image Encryption, and, Performance Analysis of Counter Mode Advanced Encryption Standard for WiMAX." University of Toledo / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1376636620.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Gürkaynak, Frank Kağan. "GALS system design side channel attack secure cryptographic accelerators." Konstanz Hartung-Gorre, 2006. http://e-collection.ethbib.ethz.ch/ecol-pool/diss/fulltext/eth16351.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Serter, Ahmet Volkan. "Implementation And Comparison Of The Advanced Encryption Standard Finalist Algorithms On Tms320c54x." Master's thesis, METU, 2005. http://etd.lib.metu.edu.tr/upload/2/12606839/index.pdf.

Full text
Abstract:
Implementation aspects of Advanced Encryption Standard (AES) Contest finalist algorithms (MARS, RC6, RIJNDAEL, SERPENT and TWOFISH) are studied on TMS320C54X processor. The C codes written by Brian Gladman in 1999 are adapted to TMS320C54X and the speed and memory usage values are compared with the adaptation of Karol Gorski and Michal Skalski&rsquo<br>s implementation in 1999. The effects of implementation environment are investigated by comparing the two implementations. The sensitivities of the finalist algorithms to plaintext, key and key length variations together with the possible reason
APA, Harvard, Vancouver, ISO, and other styles
15

Van, Dyken Jason Daniel. "Schemes to reduce power in FPGA implementations of the advanced encryption standard." Online access for everyone, 2007. http://www.dissertations.wsu.edu/Thesis/Fall2007/J_Van_Dyken_111307.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Kamaraj, Abinaya. "Efficient Implementation and Power Estimation of Substitute-Box in Advanced Encryption Standard." University of Cincinnati / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1464077332.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Titiu, Radu. "New Encryption Schemes and Pseudo-Random Functions with Advanced Properties from Standard Assumptions." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEN050.

Full text
Abstract:
Dans cette thèse, nous étudions la sécurité des primitives cryptographiques avancées contre des adversaires qui se comportent plus près de scénarios réels. Plus précisément, ils peuvent mettre à jour de manière adaptative leur stratégie pendant l'attaque, en fonction des informations précédemment obtenues, à partir de sources externes comme des utilisateurs corrompus. Nous construisons des fonctions pseudo-aléatoires distribuées produisant des valeurs qui paraissent aléatoires, même si l'adversaire peut corrompre de manière adaptative certains serveurs. Un tel système suppose que la clé secrèt
APA, Harvard, Vancouver, ISO, and other styles
18

Мельник, Б. А. "Програмні засоби безпечного обміну повідомленнями". Thesis, Чернігів, 2021. http://ir.stu.cn.ua/123456789/23057.

Full text
Abstract:
Мельник, Б. А. Програмні засоби безпечного обміну повідомленнями : випускна кваліфікаційна робота : 123 "Кoмп’ютepнa iнжeнepiя" / Б. А. Мельник ; керівник роботи С. С. Стасюк ; НУ "Чернігівська політехніка", кафедра iнфopмaцiйниx тa кoмп’ютepниx cиcтeм. – Чернігів, 2021. – 73 с.<br>Об’єктом дослідження даної кваліфікаційної роботи бакалавра є алгоритм шифрування повідомлення, для забезпечення захисту приватної інформації. Метою роботи є розробка системи шифрування та дешифрування повідомлення, реалізація одного з протоколів шифрування, які використовують найвідоміші месенджери. У результаті б
APA, Harvard, Vancouver, ISO, and other styles
19

Lopez, Samuel. "MODERN CRYPTOGRAPHY." CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/729.

Full text
Abstract:
We live in an age where we willingly provide our social security number, credit card information, home address and countless other sensitive information over the Internet. Whether you are buying a phone case from Amazon, sending in an on-line job application, or logging into your on-line bank account, you trust that the sensitive data you enter is secure. As our technology and computing power become more sophisticated, so do the tools used by potential hackers to our information. In this paper, the underlying mathematics within ciphers will be looked at to understand the security of modern cip
APA, Harvard, Vancouver, ISO, and other styles
20

Fransson, Mattias. "Power Analysis of the Advanced Encryption Standard : Attacks and Countermeasures for 8-bit Microcontrollers." Thesis, Linköpings universitet, Informationskodning, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-122718.

Full text
Abstract:
The Advanced Encryption Standard is one of the most common encryption algorithms. It is highly resistant to mathematical and statistical attacks, however, this security is based on the assumption that an adversary cannot access the algorithm’s internal state during encryption or decryption. Power analysis is a type of side-channel analysis that exploit information leakage through the power consumption of physical realisations of cryptographic systems. Power analysis attacks capture intermediate results during AES execution, which combined with knowledge of the plaintext or the ciphertext can r
APA, Harvard, Vancouver, ISO, and other styles
21

Ramos, Neto Otacílio de Araújo. "Estudo e implementação de ip-cores para Criptografia simétrica baseada no Advanced encryption standard (AES)." Universidade Federal da Paraí­ba, 2013. http://tede.biblioteca.ufpb.br:8080/handle/tede/6092.

Full text
Abstract:
Made available in DSpace on 2015-05-14T12:36:39Z (GMT). No. of bitstreams: 1 arquivototal.pdf: 1849104 bytes, checksum: 222c0377ddf502eb4a6c7fd2f658bdb1 (MD5) Previous issue date: 2013-01-31<br>Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES<br>This work addresses data encryption using Rijndael symmetric key encryption algorithm , which is used in Advanced Encryption Standard - AES. AES has massively widespread in computing, communications, and broadcast media applications, due to its robustness. By intensively using of all flavors and sizes of devices and networks, the
APA, Harvard, Vancouver, ISO, and other styles
22

Mischke, Oliver Marc [Verfasser], Tim [Gutachter] Güneysu, and Stefan [Gutachter] Mangard. "Physical attacks and countermeasures on the advanced encryption standard / Oliver Marc Mischke. Gutachter: Tim Güneysu ; Stefan Mangard." Bochum : Ruhr-Universität Bochum, 2016. http://d-nb.info/1102525537/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Perera, Kevin. "An Automatable Workflow to Analyze and Secure Integrated Circuits Against Power Analysis Attacks." Case Western Reserve University School of Graduate Studies / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=case1491319301653169.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Yang, Xiaokun. "A High Performance Advanced Encryption Standard (AES) Encrypted On-Chip Bus Architecture for Internet-of-Things (IoT) System-on-Chips (SoC)." FIU Digital Commons, 2016. http://digitalcommons.fiu.edu/etd/2477.

Full text
Abstract:
With industry expectations of billions of Internet-connected things, commonly referred to as the IoT, we see a growing demand for high-performance on-chip bus architectures with the following attributes: small scale, low energy, high security, and highly configurable structures for integration, verification, and performance estimation. Our research thus mainly focuses on addressing these key problems and finding the balance among all these requirements that often work against each other. First of all, we proposed a low-cost and low-power System-on-Chips (SoCs) architecture (IBUS) that can fram
APA, Harvard, Vancouver, ISO, and other styles
25

Noroozi, Hamid. "Alternative Polynomials for Rijndael : Diffusion Analysis." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-36304.

Full text
Abstract:
The Rijndael cryptosystem uses a particular polynomial to create its constants. All calculations within the encryption and decryption layers are based on this polynomial. This arouse the curiosity to see what happens if the polynomial is substituted by other polynomials. This paper’s main area of study is to investigate the consequences of using different polynomials to construct the Rijndael cryptosystem. To do so, as a phase of this study, a Mathematica package has been created to ease the investigations. As the second phase, using the aforementioned package, some kind of diffusion analysis
APA, Harvard, Vancouver, ISO, and other styles
26

Ondrejech, Martin. "Program (.NET/C#) pro výuku a vysvětlení funkce šifry AES." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2013. http://www.nusl.cz/ntk/nusl-220316.

Full text
Abstract:
This work is focused on cipher algorithm AES, his selection method and description of cipher blocks, possibilities of .NET framework and current implementation of AES algorithm in C#. The book also contain complete application for teaching and explanation of AES cipher.
APA, Harvard, Vancouver, ISO, and other styles
27

Škoda, Martin. "Implementace symetrické blokové šifry AES na moderních procesorech." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220616.

Full text
Abstract:
The main aim of master's thesis is usage of new instructions from instruction set called Intel® Advanced Encryption Standard New Instructions (AES-NI), which is available on processors with code name Westmere and newer. In theoretical part, there are described symmetric block ciphers and their operational modes. Cipher AES is described in details, especially used block transformations, key expansion and equivalent inverse cipher. Next topic is description of instructions of AES-NI instruction set – their function is explained using pseudo codes of instructions and there are examples of their u
APA, Harvard, Vancouver, ISO, and other styles
28

May, Lauren Jeanette. "Design, analysis and implementation of symmetric block ciphers." Thesis, Queensland University of Technology, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Fuller, Joanne Elizabeth. "Analysis of affine equivalent boolean functions for cryptography." Thesis, Queensland University of Technology, 2003. https://eprints.qut.edu.au/15828/1/Joanne_Fuller_Thesis.pdf.

Full text
Abstract:
Boolean functions are an important area of study for cryptography. These functions, consisting merely of one's and zero's, are the heart of numerous cryptographic systems and their ability to provide secure communication. Boolean functions have application in a variety of such systems, including block ciphers, stream ciphers and hash functions. The continued study of Boolean functions for cryptography is therefore fundamental to the provision of secure communication in the future. This thesis presents an investigation into the analysis of Boolean functions and in particular, analysis of affine
APA, Harvard, Vancouver, ISO, and other styles
30

Fuller, Joanne Elizabeth. "Analysis of Affine Equivalent Boolean Functions for Cryptography." Queensland University of Technology, 2003. http://eprints.qut.edu.au/15828/.

Full text
Abstract:
Boolean functions are an important area of study for cryptography. These functions, consisting merely of one's and zero's, are the heart of numerous cryptographic systems and their ability to provide secure communication. Boolean functions have application in a variety of such systems, including block ciphers, stream ciphers and hash functions. The continued study of Boolean functions for cryptography is therefore fundamental to the provision of secure communication in the future. This thesis presents an investigation into the analysis of Boolean functions and in particular, analysis of affine
APA, Harvard, Vancouver, ISO, and other styles
31

Pehlivanoglu, Serdar. "Rijndael Circuit Level Cryptanalysis." Link to electronic thesis, 2005. http://www.wpi.edu/Pubs/ETD/Available/etd-050505-121816/.

Full text
Abstract:
Thesis (M.S.) -- Worcester Polytechnic Institute.<br>Keywords: private-key cryptography; Advanced Encryption Standard; K-secure; hermetic; block cipher; circuit complexity. Includes bibliographical references (p. 75-79).
APA, Harvard, Vancouver, ISO, and other styles
32

Shin, Dong Il. "Improving trust and securing data accessibility for e-health decision making by using data encryption techniques." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/50636/1/Dong_Il_Shin_Thesis.pdf.

Full text
Abstract:
In the medical and healthcare arena, patients‟ data is not just their own personal history but also a valuable large dataset for finding solutions for diseases. While electronic medical records are becoming popular and are used in healthcare work places like hospitals, as well as insurance companies, and by major stakeholders such as physicians and their patients, the accessibility of such information should be dealt with in a way that preserves privacy and security. Thus, finding the best way to keep the data secure has become an important issue in the area of database security. Sensitive med
APA, Harvard, Vancouver, ISO, and other styles
33

Mirbaha, Amir-Pasha. "Etude de la vulnérabilité des circuits cryptographiques l'injection de fautes par laser." Phd thesis, Ecole Nationale Supérieure des Mines de Saint-Etienne, 2011. http://tel.archives-ouvertes.fr/tel-00844751.

Full text
Abstract:
Les circuits cryptographiques peuvent etre victimes d'attaques en fautes visant leur implementation materielle. elles consistent a creer des fautes intentionnelles lors des calculs cryptographiques afin d'en deduire des informations confidentielles. dans le contexte de la caracterisation securitaire des circuits, nous avons ete amenes a nous interroger sur la faisabilite experimentale de certains modeles theoriques d'attaques. nous avons utilise un banc laser comme moyen d'injection de fautes.dans un premier temps, nous avons effectue des attaques en fautes dfa par laser sur un microcontroleur
APA, Harvard, Vancouver, ISO, and other styles
34

Marion, Damien. "Multidimensionality of the models and the data in the side-channel domain." Thesis, Paris, ENST, 2018. http://www.theses.fr/2018ENST0056/document.

Full text
Abstract:
Depuis la publication en 1999 du papier fondateur de Paul C. Kocher, Joshua Jaffe et Benjamin Jun, intitulé "Differential Power Analysis", les attaques par canaux auxiliaires se sont révélées être un moyen d’attaque performant contre les algorithmes cryptographiques. En effet, il s’est avéré que l’utilisation d’information extraite de canaux auxiliaires comme le temps d’exécution, la consommation de courant ou les émanations électromagnétiques, pouvait être utilisée pour retrouver des clés secrètes. C’est dans ce contexte que cette thèse propose, dans un premier temps, de traiter le problème d
APA, Harvard, Vancouver, ISO, and other styles
35

Marion, Damien. "Multidimensionality of the models and the data in the side-channel domain." Electronic Thesis or Diss., Paris, ENST, 2018. http://www.theses.fr/2018ENST0056.

Full text
Abstract:
Depuis la publication en 1999 du papier fondateur de Paul C. Kocher, Joshua Jaffe et Benjamin Jun, intitulé "Differential Power Analysis", les attaques par canaux auxiliaires se sont révélées être un moyen d’attaque performant contre les algorithmes cryptographiques. En effet, il s’est avéré que l’utilisation d’information extraite de canaux auxiliaires comme le temps d’exécution, la consommation de courant ou les émanations électromagnétiques, pouvait être utilisée pour retrouver des clés secrètes. C’est dans ce contexte que cette thèse propose, dans un premier temps, de traiter le problème d
APA, Harvard, Vancouver, ISO, and other styles
36

Henricksen, Matthew. "Design, Implementation and Cryptanalysis of Modern Symmetric Ciphers." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16055/1/Matt_Henricksen_Thesis.pdf.

Full text
Abstract:
The main objective of this thesis is to examine the trade-offs between security and efficiency within symmetric ciphers. This includes the influence that block ciphers have on the new generation of word-based stream ciphers. By incorporating block-cipher like components into their designs, word-based stream ciphers have experienced hundreds-fold improvement in speed over bit-based stream ciphers, without any observable security degradation. The thesis also emphasizes the importance of keying issues in block and stream ciphers, showing that by reusing components of the principal cipher alg
APA, Harvard, Vancouver, ISO, and other styles
37

Henricksen, Matthew. "Design, Implementation and Cryptanalysis of Modern Symmetric Ciphers." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16055/.

Full text
Abstract:
The main objective of this thesis is to examine the trade-offs between security and efficiency within symmetric ciphers. This includes the influence that block ciphers have on the new generation of word-based stream ciphers. By incorporating block-cipher like components into their designs, word-based stream ciphers have experienced hundreds-fold improvement in speed over bit-based stream ciphers, without any observable security degradation. The thesis also emphasizes the importance of keying issues in block and stream ciphers, showing that by reusing components of the principal cipher alg
APA, Harvard, Vancouver, ISO, and other styles
38

BOLLO, MATTEO. "Architectures and Design Methodologies for Micro and Nanocomputing." Doctoral thesis, Politecnico di Torino, 2017. http://hdl.handle.net/11583/2679368.

Full text
Abstract:
For many years, the transistors placement was not limited by interconnections thanks to the Digital Integrated Circuits market that is changing from a situation where CMOS technology was the reference (microelectronics era) to a plurality of emerging technologies (nanoelectronics era). The costs of optics photolithography needed to produce the recent CMOS technologies are increasing to such an extent as to make interesting the exploration of nanoelectronics alternative solutions. These technologies are called beyond CMOS technologies. Among the application fields, Information Security is one
APA, Harvard, Vancouver, ISO, and other styles
39

Fujdiak, Radek. "Kryptografický protokol s veřejným klíčem." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2013. http://www.nusl.cz/ntk/nusl-220309.

Full text
Abstract:
The Master thesis is an introduction to cryptology. The Thesis describe cryptosystems and selects one ideal cypher for low-power microcontroler. In thesis provides manual for instal development program COde Composer Studio, basic implementation of selected cryptosystem with small numbers and suggestion for implementation selected cyptosystem with big numbers.
APA, Harvard, Vancouver, ISO, and other styles
40

Ke, Hung-Chin, and 柯宏親. "IP reuse design and Verification for Advance Encryption Standard algorithm." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/85678419860986148393.

Full text
Abstract:
碩士<br>國立中央大學<br>電機工程研究所<br>90<br>In order to speed up the pace of system on a chip (SOC) development, designers intend to integrate intellectual properties (IP) into the chip. IP in chip design industry refers to pre-designed and pre-verified building blocks that can be reused for faster time-to-market. In this thesis, the research is focus on the characteristic of Advance Encryption Standard (AES). Using the IP reuse concept of AES to implement the 128bits block cipher efficiently and increase flexibility of Encryptor / Decryptor, we design Encryption Core and Decryption Core separately. More
APA, Harvard, Vancouver, ISO, and other styles
41

Abdulwahed, Naif B. "CHAOS-BASED ADVANCED ENCRYPTION STANDARD." Thesis, 2013. http://hdl.handle.net/10754/292821.

Full text
Abstract:
This thesis introduces a new chaos-based Advanced Encryption Standard (AES). The AES is a well-known encryption algorithm that was standardized by U.S National Institute of Standard and Technology (NIST) in 2001. The thesis investigates and explores the behavior of the AES algorithm by replacing two of its original modules, namely the S-Box and the Key Schedule, with two other chaos- based modules. Three chaos systems are considered in designing the new modules which are Lorenz system with multiplication nonlinearity, Chen system with sign modules nonlinearity, and 1D multiscroll system with s
APA, Harvard, Vancouver, ISO, and other styles
42

Jagadev, Aseem, and Vivek Senapati. "Advanced Encryption Standard (AES) Implementation." Thesis, 2009. http://ethesis.nitrkl.ac.in/310/1/final_thesis_modified.pdf.

Full text
Abstract:
The thesis includes the complete step by step implementation of Advanced Encryption Technique, i.e. encrypting and decrypting 128 bit data using the AES and it’s modification for enhanced reliability and security. The encryption process consists of the combination of various classical techniques such as substitution, rearrangement and transformation encoding techniques. The encryption and decryption modules include the Key Expansion module which generates Key for all iterations. The modifications include the addition of an arithmetic operation and a route transposition cipher in the attacks it
APA, Harvard, Vancouver, ISO, and other styles
43

Hsun, Chih-Chiao, and 郇智喬. "A study on encryption strength of advanced encryption standard." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/10655396903461876081.

Full text
Abstract:
碩士<br>東吳大學<br>資訊管理學系<br>97<br>With the popularity of the Internet, information transmission speed and convenience has also been a substantial increase. In the transmission of sensitive or confidential information, you can encrypt the files in order to prevent the leakage or intercept of information. There are many kind of mainstream encryption functions. In our study, the Advanced Encryption Standard(AES) is used to encrypt several common file types by changing the encryption key or plaintext in different encryption modes to examine its encryption strength. The comparisons of ciphertexts have
APA, Harvard, Vancouver, ISO, and other styles
44

Yeh, Hsing-Chang, and 葉幸彰. "VLSI Design of Advanced Encryption Standard." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/14084198867865588250.

Full text
Abstract:
碩士<br>國立臺灣師範大學<br>應用電子科技學系<br>100<br>Advance Encryption Standard (AES) hardware implementation in FPGA and ASIC have been intensely discussed, especially in high-throughput of Giga bit per second (Gbps). However, our team have many designs in FPGA in the recent years but not yet implemented in Cell-Based Design. Therefore, this paper improve the hardware architecture of AES , setup the environment and server , Then through Cell-Based Design flow to implement the AES Chip. First, this paper use the EDA tools provided by the National Chip Implementation Center to setup the environment for a
APA, Harvard, Vancouver, ISO, and other styles
45

Tibrewal, Ashutosh, and Vikash Kumar. "FPGA Implementation of Advanced Encryption Standard." Thesis, 2014. http://ethesis.nitrkl.ac.in/6506/1/110EC0183-17.pdf.

Full text
Abstract:
Security is a crucial parameter to be recognized with the improvement of electronic communication. Today most research in the field of electronic communication includes look into on security concern of communication. At present most by and large consumed and recognized standard for encryption of data is the Advanced Encryption Standard. AES was transformed to supplant the developing Data Encryption Standard. The AES calculation is fit for handling cryptographic keys which are of 256, 128, & 192 bits to encode & unscramble data in squares of 128 bits. The center of the calculation is made up of
APA, Harvard, Vancouver, ISO, and other styles
46

Chung-Yuan, Li, and 李宗遠. "Multimedia assistant with Advanced Encryption Standard(AES)." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/81407052488766148380.

Full text
Abstract:
碩士<br>國立交通大學<br>電機與控制工程系<br>90<br>The system proposed here integrates the functions of MP3 player, digital camera, and voice recorder, which are all controlled by 8051. The MP3 player supports not only normal functions but also six equalizer modes, the digital camera provides the VGA(640x480) format, and the voice recorder can store speech data with bit rate 16/24/32 Kbps. The MP3 and JPEG files can be saved to CompactFlash card with the format of FAT 12/16. Additionally, the Advanced Encryption Standard(AES)is introduced to keep stored data confidential. The system also supports the data encr
APA, Harvard, Vancouver, ISO, and other styles
47

Chain, Kai, and 程凱. "Design and Implementation of Advanced Encryption Standard." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/26708750959629713273.

Full text
Abstract:
碩士<br>國立臺灣大學<br>電子工程學研究所<br>91<br>Equipped with current electrical communication techniques, more and more services can be delivered on Internet, e.g., Internet market, electronic bank, and electronic government. Sometimes when important information has to be transferred, we prefer high data security such that we must apply a cryptosystem in network communication. In this Thesis, a new cryptosystem AES (Advanced Encryption Standard), which generates good data security, will be presented. In November 26, 2001, AES, a s
APA, Harvard, Vancouver, ISO, and other styles
48

Ou-Yang, Yen, and 歐陽諺. "Fast Image Encryption Based on Lifting Wavelet Transform and Advanced Encryption Standard." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/89200471963606880129.

Full text
Abstract:
碩士<br>大葉大學<br>資訊工程學系碩士班<br>99<br>In this thesis, We simulate wavelet hierarchical features, combined with the the look-up table of Advanced Encryption Standard, and the mix column’s finite fields GF(28) multiplication and addition, and propose a low-volume image encryption algorithm, which considers digital image as a big block and encryption of the big block. The selection and generation of subkey depends on the user’s key, make the encryption, decryption and key generation system use the same algorithm. The results (effects) of encryption and decryption can be achieved by only changing look-
APA, Harvard, Vancouver, ISO, and other styles
49

Hsieh, Cheng-hong, and 謝正洪. "DESIGN AND IMPLEMENTATION OF ADVANCED ENCRYPTION STANDARD CHIP." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/83951116859290358972.

Full text
Abstract:
碩士<br>大同大學<br>電機工程研究所<br>91<br>In this thesis, we present a chip of the encryption and decryption with 128, 192, and 256 bits of keys based on the AES (Advanced Encryption Standard) algorithm. It deals with the data of 128 bits, and it can connect to computer through USB to complete the work of the encryption and decryption. The AES can be used in variety of Electronic Funds Transfer applications as well as other electronic banking and data handling applications where data must be encrypted. To realize the chip of this design, we use VHDL, Xilinx tool and Synopsys library to design
APA, Harvard, Vancouver, ISO, and other styles
50

Godbole, Pankaj. "Optimizing the advanced encryption standard on Intel's SIMD architecture." Thesis, 2004. http://hdl.handle.net/1957/28870.

Full text
Abstract:
The Advanced Encryption Standard (AES) is the new standard for cryptography and has gained wide support as a means to secure digital data. Hence, it is beneficial to develop an implementation of AES that has a high throughput. SIMD technology is very effective in increasing the performance of some cryptographic applications. This thesis describes an optimized implementation of the AES in software based on Intel's SIMD architecture. Our results show that our technique yields a significant increase in the performance and thereby the throughput of AES. They also demonstrate that AES is a good can
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!