Hardware implementation of block cipher algorithm

被引:0
|
作者
School of Computer, Wuhan University, Wuhan 430079, China [1 ]
不详 [2 ]
机构
来源
Harbin Gongye Daxue Xuebao | 2006年 / 9卷 / 1558-1562期
关键词
Cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] FPGA Based Cipher Design & Implementation of Recursive Oriented Block Arithmetic and Substitution Technique (ROBAST)
    Chakraborty, Rajdeep
    Mandal, J. K.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2011, 2 (04) : 54 - 59
  • [32] Efficient FPGA Implementation of the RC4 Stream Cipher using Block RAM and Pipelining
    Taqieddin, Eyad
    Abu-Rjei, Ola
    Mhaidat, Khaldoon
    Bani-Hani, Raed
    6TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN 2015)/THE 5TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2015), 2015, 63 : 8 - 15
  • [33] A Compact Design of SEED Block Cipher
    Pirpilidis, Filippos
    Kitsos, Paris
    Kakarountas, Athanasios
    2015 4TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2015, : 119 - 123
  • [34] Hash function based on block cipher
    Yi, X
    Lam, KY
    ELECTRONICS LETTERS, 1997, 33 (23) : 1938 - 1940
  • [35] Integral Cryptanalysis of the BSPN Block Cipher
    Heys, Howard
    2014 27TH BIENNIAL SYMPOSIUM ON COMMUNICATIONS (QBSC), 2014, : 153 - 158
  • [36] Optimized Implementation of PIPO Block Cipher on 32-Bit ARM and RISC-V Processors
    Kim, Youngbeom
    Seo, Seog Chung
    IEEE ACCESS, 2022, 10 : 97298 - 97309
  • [37] Cryptanalysis of Stream Cipher: Method Implementation
    Al-Sabaawi, Aiman
    2021 IEEE ASIA-PACIFIC CONFERENCE ON COMPUTER SCIENCE AND DATA ENGINEERING (CSDE), 2021,
  • [38] Efficient hardware implementations of QTL cipher for RFID applications
    Shrivastava N.
    Singh P.
    Acharya B.
    International Journal of High Performance Systems Architecture, 2020, 9 (01) : 1 - 10
  • [39] Efficient Hardware Implementation of Image Watermarking Using DWT and AES Algorithm
    Singh, Gulroz
    Lamba, Mankirat Singh
    PROCEEDINGS OF THE 2015 39TH NATIONAL SYSTEMS CONFERENCE (NSC), 2015,
  • [40] Hardware implementation of blowfish algorithm for the secure data transmission in Internet of Things
    Suresh, Manju
    Neema, M.
    1ST GLOBAL COLLOQUIUM ON RECENT ADVANCEMENTS AND EFFECTUAL RESEARCHES IN ENGINEERING, SCIENCE AND TECHNOLOGY - RAEREST 2016, 2016, 25 : 248 - 255