Journal articles on the topic 'Hardware based encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Hardware based encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Huang, Xing Li, and Huan Chun Yang. "Two-Way ID Authentication and Hardware Encryption-Based Security Design of Mobile Hard Disk." Applied Mechanics and Materials 58-60 (June 2011): 573–78. http://dx.doi.org/10.4028/www.scientific.net/amm.58-60.573.
Full textKanda, Guard, and Kwangki Ryoo. "Vedic Multiplier-based International Data Encryption Algorithm Crypto-Core for Efficient Hardware Multiphase Encryption Design." Webology 19, no. 1 (2022): 4581–96. http://dx.doi.org/10.14704/web/v19i1/web19304.
Full textLee, Jaehyeok, Phap Ngoc Duong, and Hanho Lee. "Configurable Encryption and Decryption Architectures for CKKS-Based Homomorphic Encryption." Sensors 23, no. 17 (2023): 7389. http://dx.doi.org/10.3390/s23177389.
Full textPAPAEFSTATHIOU, IOANNIS. "LOW LEVEL HARDWARE COMPRESSION FOR MULTI-GIGABIT NETWORKS." Journal of Circuits, Systems and Computers 13, no. 06 (2004): 1307–19. http://dx.doi.org/10.1142/s0218126604001969.
Full textB, Lakshmi, Kirubakaran E, and Prabakar T.N. "FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION." ICTACT Journal on Communication Technology 01, no. 03 (2010): 150–56. http://dx.doi.org/10.21917/ijct.2010.0022.
Full textXiao Bao-Jin, Tong Hai-Li, Zhang Jian-Zhong, Zhang Chao-Xia, and Wang Yun-Cai. "Spread spectrum communication based on hardware encryption." Acta Physica Sinica 60, no. 8 (2011): 080506. http://dx.doi.org/10.7498/aps.60.080506.
Full textHuang, Birong, Zhansheng Hou, Peng Lin, and Fei Zhou. "Implementation Method Of Remote Assistance Instruction Based On Hardware Secure Encryption." Journal of Physics: Conference Series 2136, no. 1 (2021): 012031. http://dx.doi.org/10.1088/1742-6596/2136/1/012031.
Full textLi, Jiakun, Yixuan Luo, Fei Wang, and Wei Gao. "Design and Implementation of Real-Time Image Acquisition Chip Based on Triple-Hybrid Encryption System." Electronics 11, no. 18 (2022): 2925. http://dx.doi.org/10.3390/electronics11182925.
Full textMahmood, Zainab H., and Mahmood K. Ibrahem. "HARDWARE IMPLEMENTATION OF AN ENCRYPTION FOR ENHANCEMENT DGHV." Iraqi Journal of Information & Communications Technology 2, no. 2 (2019): 44–57. http://dx.doi.org/10.31987/ijict.2.2.69.
Full text张, 晓强. "Image Encryption Algorithm Based on the Hardware Platform." Journal of Image and Signal Processing 08, no. 02 (2019): 98–102. http://dx.doi.org/10.12677/jisp.2019.82014.
Full textRuan, Wei Hua, and Qing Sheng Hu. "A Kind of Logarithmic Function Hardware Encryptor and Decryptor." Applied Mechanics and Materials 427-429 (September 2013): 2956–59. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2956.
Full textBin, Wang, Chong Ran Jiang, and Jing Li. "The Research of Hard Disk Encryption System Based on Advanced Encryption Standard Algorithm." Applied Mechanics and Materials 299 (February 2013): 172–75. http://dx.doi.org/10.4028/www.scientific.net/amm.299.172.
Full textZeebaree, Subhi R. M. "DES encryption and decryption algorithm implementation based on FPGA." Indonesian Journal of Electrical Engineering and Computer Science 18, no. 2 (2020): 774. http://dx.doi.org/10.11591/ijeecs.v18.i2.pp774-781.
Full textSubhi, R. M. Zeebaree. "DES encryption and decryption algorithm implementation based on FPGA." Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 18, no. 2 (2020): 774–81. https://doi.org/10.11591/ijeecs.v18.i2.pp774-781.
Full textSamir, El Adib, and Raissouni Naoufal. "CompactRIO Based Real Time Implementation of AES Algorithm for Embedded Applications." International Journal of Embedded and Real-Time Communication Systems 10, no. 2 (2019): 19–36. http://dx.doi.org/10.4018/ijertcs.2019040102.
Full textNedjah, Nadia, and Luiza Mourelle. "Pareto-Optimal Hardware for Substitution Boxes." JUCS - Journal of Universal Computer Science 12, no. (4) (2006): 395–407. https://doi.org/10.3217/jucs-012-04-0395.
Full textStănică, George Cosmin, and Petre Anghelescu. "Multi-Layer Cryptosystem Using Reversible Cellular Automata." Electronics 14, no. 13 (2025): 2627. https://doi.org/10.3390/electronics14132627.
Full textLin, Zhuosheng, Simin Yu, Chengqing Li, Jinhu Lü, and Qianxue Wang. "Design and Smartphone-Based Implementation of a Chaotic Video Communication Scheme via WAN Remote Transmission." International Journal of Bifurcation and Chaos 26, no. 09 (2016): 1650158. http://dx.doi.org/10.1142/s0218127416501583.
Full textYang, Huiwei. "Application of Hybrid Encryption Algorithm in Hardware Encryption Interface Card." Security and Communication Networks 2022 (May 30, 2022): 1–11. http://dx.doi.org/10.1155/2022/7794209.
Full textOlvera-Martinez, Luis, Manuel Cedillo-Hernandez, Carlos Adolfo Diaz-Rodriguez, Leonardo Faustinos-Morales, Antonio Cedillo-Hernandez, and Francisco Javier Garcia-Ugalde. "Symmetric Grayscale Image Encryption Based on Quantum Operators with Dynamic Matrices." Mathematics 13, no. 6 (2025): 982. https://doi.org/10.3390/math13060982.
Full textHres, Oleksandr, Andrii Veryha, and Halyna Lastivka. "Using PIC18 Microcontrollers to Generate Chaotic Signals Based on Logistic Mapping." Security of Infocommunication Systems and Internet of Things, no. 1 (June 30, 2023): 01012. http://dx.doi.org/10.31861/sisiot2023.1.01012.
Full textFeng, YeJi, XiaoDong Liu, Shuai Jing, et al. "Optimization and Design of Key Expansion of SM4 Algorithm Based on ZYNQ." Journal of Physics: Conference Series 2296, no. 1 (2022): 012014. http://dx.doi.org/10.1088/1742-6596/2296/1/012014.
Full textWang, Mei Zhen, Feng Wu, Wei Ming Li, Ling Xiao, and Jiang Yuan. "A Packet-Combining Algorithm Based on SSLVPN with Hardware Acceleration Devices." Advanced Materials Research 660 (February 2013): 152–57. http://dx.doi.org/10.4028/www.scientific.net/amr.660.152.
Full textYang, Chen, Ping Pan, and Qun Ding. "Image Encryption Scheme Based on Mixed Chaotic Bernoulli Measurement Matrix Block Compressive Sensing." Entropy 24, no. 2 (2022): 273. http://dx.doi.org/10.3390/e24020273.
Full textLian, Ji Hong, and Kai Chen. "Implementation of DES Encryption Algorithm Based on FPGA and Performance Analysis." Applied Mechanics and Materials 130-134 (October 2011): 2953–56. http://dx.doi.org/10.4028/www.scientific.net/amm.130-134.2953.
Full textElrefai, Hisham M., Wafaa S. Sayed, and Lobna A. Said. "Hardware Implementation of a 2D Chaotic Map-Based Audio Encryption System Using S-Box." Electronics 13, no. 21 (2024): 4254. http://dx.doi.org/10.3390/electronics13214254.
Full textFadhil, Sahib Hasan, and Amer Saffo Maryam. "FPGA Hardware Co-Simulation of Image Encryption using Hybrid Chaotic Maps Based Stream Cipher." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 4 (2020): 215–25. https://doi.org/10.35940/ijeat.D6713.049420.
Full textLi, Yong Fei. "Design and Implementation of Encryption Scheme in Web-Based Examination System." Advanced Materials Research 756-759 (September 2013): 1106–9. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1106.
Full textTeli, Mallikarjun Awwanna. "Design and verification of AES cryptography algorithm on RISC-V." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem42109.
Full textLIN, XIN, WEIHUI SHI, and YONGXIANG DU. "INTERACTIVE DATA ENCRYPTION STRATEGY FOR DISTRIBUTED SIMULATION SYSTEM." International Journal of Modeling, Simulation, and Scientific Computing 04, no. 04 (2013): 1342005. http://dx.doi.org/10.1142/s1793962313420051.
Full textYu, Jiayin, Yaqin Xie, Shiyu Guo, Yanqi Zhou, and Erfu Wang. "Parallel Encryption of Noisy Images Based on Sequence Generator and Chaotic Measurement Matrix." Complexity 2020 (May 7, 2020): 1–18. http://dx.doi.org/10.1155/2020/1987670.
Full textTang, Hong Wei. "32-bit Datapath AES IP Core Based on FPGA." Applied Mechanics and Materials 336-338 (July 2013): 1848–51. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.1848.
Full textMedileh, Saci, Abdelkader Laouid, Mohammad Hammoudeh, et al. "A Multi-Key with Partially Homomorphic Encryption Scheme for Low-End Devices Ensuring Data Integrity." Information 14, no. 5 (2023): 263. http://dx.doi.org/10.3390/info14050263.
Full textGorlov, Lev, Maksim Iavich, and Razvan Bocu. "Linear Layer Architecture Based on Cyclic Shift and XOR." Symmetry 15, no. 8 (2023): 1496. http://dx.doi.org/10.3390/sym15081496.
Full textКруліковський, Олег, Сергій Галюк, Ігор Сафронов, and Іван Горбенко. "Ukrainian National Encryption Standards for FPGA Based Embedded Systems." Security of Infocommunication Systems and Internet of Things, no. 1 (June 30, 2023): 01005. http://dx.doi.org/10.31861/sisiot2023.1.01005.
Full textYang, Junpu. "Computer Data Encryption System Based on Nonlinear Partial Differential Equations." Mobile Information Systems 2022 (August 19, 2022): 1–9. http://dx.doi.org/10.1155/2022/3395019.
Full textPapadogiannaki, Eva, and Sotiris Ioannidis. "Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware." Sensors 21, no. 4 (2021): 1140. http://dx.doi.org/10.3390/s21041140.
Full textPushpalatha, G. S., and Ramesh S. Dr. "Collective Research Review on Chaotic Based Encryption Algorithms, Speech Encryption Algorithms and Cryptographic Requirements." International Journal of Engineering and Management Research 14, no. 2 (2024): 165–70. https://doi.org/10.5281/zenodo.11201784.
Full textMa, Xiao Cong, Guang Hui Cai, Hong Chao Sun, and Hong Ye Li. "Design and Implementation of an Encryption/Decryption System Based on FPGA." Advanced Materials Research 1022 (August 2014): 368–71. http://dx.doi.org/10.4028/www.scientific.net/amr.1022.368.
Full textLiang, Wei, Jian Bo Xu, Wei Hong Huang, and Li Peng. "The Design and Implementation of ECC High-Speed Encryption Engine Based on FPGA." Advanced Materials Research 459 (January 2012): 544–48. http://dx.doi.org/10.4028/www.scientific.net/amr.459.544.
Full textSalmanov, V. "POLYMORPHİC ENCRYPTİON AND DECRYPTİON ALGORİTHMS." Sciences of Europe, no. 98 (August 8, 2022): 76–79. https://doi.org/10.5281/zenodo.6973815.
Full textShi, Yanfeng, Jiqiang Liu, Zhen Han, and Shuo Qiu. "Deterministic attribute-based encryption." International Journal of High Performance Computing and Networking 9, no. 5/6 (2016): 443. http://dx.doi.org/10.1504/ijhpcn.2016.080417.
Full textFetteha, Marwan A., Wafaa S. Sayed, and Lobna A. Said. "A Lightweight Image Encryption Scheme Using DNA Coding and Chaos." Electronics 12, no. 24 (2023): 4895. http://dx.doi.org/10.3390/electronics12244895.
Full textDo, Taehoon, Seungwoo Park, Jaehwan Lee, and Sangoh Park. "M-folding method–based elliptic curve cryptosystem for industrial cyber-physical system." International Journal of Distributed Sensor Networks 15, no. 10 (2019): 155014771987904. http://dx.doi.org/10.1177/1550147719879045.
Full textChen, Baoju, Simin Yu, Ping Chen, Liangshan Xiao, and Jinhu Lü. "Design and Virtex-7-Based Implementation of Video Chaotic Secure Communications." International Journal of Bifurcation and Chaos 30, no. 05 (2020): 2050075. http://dx.doi.org/10.1142/s0218127420500753.
Full textLee, Sung-Won, and Kwee-Bo Sim. "Design and Hardware Implementation of a Simplified DAG-Based Blockchain and New AES-CBC Algorithm for IoT Security." Electronics 10, no. 9 (2021): 1127. http://dx.doi.org/10.3390/electronics10091127.
Full textÁlvarez, Rafael, Alicia Andrade, and Antonio Zamora. "Optimizing a Password Hashing Function with Hardware-Accelerated Symmetric Encryption." Symmetry 10, no. 12 (2018): 705. http://dx.doi.org/10.3390/sym10120705.
Full textHuang, Gao Feng. "A File Encryption System Based on Fingerprint-Embedded Storage." Applied Mechanics and Materials 446-447 (November 2013): 1017–21. http://dx.doi.org/10.4028/www.scientific.net/amm.446-447.1017.
Full textZheng, Hanzhong, Simin Yu, and Xiangqian Xu. "A Systematic Methodology for Multi-Images Encryption and Decryption Based on Single Chaotic System and FPGA Embedded Implementation." Mathematical Problems in Engineering 2014 (2014): 1–15. http://dx.doi.org/10.1155/2014/698608.
Full textBIAN, Song, Masayuki HIROMOTO, and Takashi SATO. "Hardware-Accelerated Secured Naïve Bayesian Filter Based on Partially Homomorphic Encryption." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E102.A, no. 2 (2019): 430–39. http://dx.doi.org/10.1587/transfun.e102.a.430.
Full text