Single core hardware module to implement encryption in TECB mode
The growth of the Internet as a vehicle for secure communication has resulted in Data Encryption Standard (DES) no longer capable of providing high-level security for data protection. Triple Data Encryption Standard (3DES) is a symmetric block cipher with 192 bits key proposed to further enhance DES...
| Main Authors: | Reaz, M. B. I., Ibrahimy, M. I., Mohd-Yasin, F., Wei, C. S., Kamada, M. |
|---|---|
| Format: | Article |
| Published: |
SOC MICROELECTRONICS, ELECTRON COMPONENTS MATERIALS-MIDEM
2007
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/3014/ |
Similar Items
Single core hardware module to implement encryption in TECB mode
by: Reaz, Mamun Bin Ibne, et al.
Published: (2007)
by: Reaz, Mamun Bin Ibne, et al.
Published: (2007)
Encryption in TECB mode: modeling, simulation and synthesis
by: Ibrahimy, Muhammad Ibn
Published: (2007)
by: Ibrahimy, Muhammad Ibn
Published: (2007)
Hardware prototyping of an efficient encryption engine
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2010)
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2010)
Hardware prototyping of an efficient encryption engine
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2009)
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2009)
Design and implementation of a power quality disturbance classifier: An Al approach
by: Reaz, , M. B. I, et al.
Published: (2006)
by: Reaz, , M. B. I, et al.
Published: (2006)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
A New Image-Database Encryption Based on A Hybrid Approach of Data-at-Rest and Data-in-Motion Encryption Protocol.
by: Ooi, Bee Sien, et al.
Published: (2004)
by: Ooi, Bee Sien, et al.
Published: (2004)
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022)
by: Awadallah, Ruba N S
Published: (2022)
Wavelet based noise removal from EMG signals
by: Hussain, M. S., et al.
Published: (2007)
by: Hussain, M. S., et al.
Published: (2007)
k-Resilient Identity-Based Encryption in the Standard Model
by: HENG, S.-H.
Published: (2006)
by: HENG, S.-H.
Published: (2006)
An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
Development of CMOS UHF RFID modulator and demodulator using DTMOST techniques
by: Teh, Ying Khai, et al.
Published: (2009)
by: Teh, Ying Khai, et al.
Published: (2009)
Expert System for Power Quality Disturbance Classifier
by: Ibne Reaz, Mamun, et al.
Published: (2007)
by: Ibne Reaz, Mamun, et al.
Published: (2007)
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
VHDL Modeling for Classification of Power Quality Disturbance Employing Wavelet Transform, Artificial Neural Network and Fuzzy Logic
by: Reaz, M.B.I., et al.
Published: (2006)
by: Reaz, M.B.I., et al.
Published: (2006)
Biometric Template Protection Using Watermarking with Hidden Password Encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Prototyping of Wavelet Transform, Artificial Neural Network and Fuzzy Logic for Power Quality Disturbance Classifier
by: Reaz, M. B. I., et al.
Published: (2007)
by: Reaz, M. B. I., et al.
Published: (2007)
A modified-set partitioning in hierarchical trees algorithm for real-time image compression
by: Akter, M., et al.
Published: (2008)
by: Akter, M., et al.
Published: (2008)
Related-mode attacks on block cipher modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
The battle between HF and UHF RFID
by: F., Mohd-Yasin, et al.
Published: (2008)
by: F., Mohd-Yasin, et al.
Published: (2008)
Biometric Template Protection using watermarking with hidden password encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
Integrating Identity-Based Encryption (Ibe) In The Return Routability Protocol (Rrp) To Enhance Signals Security
In Mobile Ipv6.
by: S. Alsayfi, Majed Salam
Published: (2010)
by: S. Alsayfi, Majed Salam
Published: (2010)
Low power ROM Employing Dynamic Threshold-Voltage MOSFET (DTMOS) Technique
by: M., Mustapa, et al.
Published: (2008)
by: M., Mustapa, et al.
Published: (2008)
Developing designs for RFID transponder using DTMOS
by: F., Mohd-Yasin, et al.
Published: (2007)
by: F., Mohd-Yasin, et al.
Published: (2007)
Speed Efficient Hardware Implementation Of Advanced Encryption Standard (Aes)
by: Low, Chiau Thian
Published: (2017)
by: Low, Chiau Thian
Published: (2017)
Off-line keyword guessing attacks on recent Public Key Encryption with Keyword Search Schemes
by: Wei-Chuen, Yau, et al.
Published: (2008)
by: Wei-Chuen, Yau, et al.
Published: (2008)
A Dual-Mode Input Voltage Modulation Control Scheme for Voltage Multiplier Based X-Ray Power Supply
by: Iqbal, S., et al.
Published: (2008)
by: Iqbal, S., et al.
Published: (2008)
On the security bounds of CMC, EME, EME(+) and EME* - Modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
VLSI Design of a Wavelet Processing Core
by: Sze, Wei Lee, et al.
Published: (2006)
by: Sze, Wei Lee, et al.
Published: (2006)
Flood Prediction Based On Deep Learning Networks With Variational Mode Decomposition
by: Ni, Chenmin
Published: (2024)
by: Ni, Chenmin
Published: (2024)
Partial Encryption of Compressed Images Employing FPGA
by: Reaz, M.B.I., et al.
Published: (2005)
by: Reaz, M.B.I., et al.
Published: (2005)
An implementation of embedded RESTful Web services
by: Chang, C.E., et al.
Published: (2009)
by: Chang, C.E., et al.
Published: (2009)
Advanced encryption standard-XTS implementation in field programmable gate array hardware
by: Ahmed, Shakil, et al.
Published: (2015)
by: Ahmed, Shakil, et al.
Published: (2015)
A single link flexible manipulator control using fuzzy logic
by: Hasan , M. A., et al.
Published: (2009)
by: Hasan , M. A., et al.
Published: (2009)
Joint adaptive modulation adaptive beamforming for mobile transmissions
by: Ibrahim, S. A., et al.
Published: (2007)
by: Ibrahim, S. A., et al.
Published: (2007)
Towards dispersion relations for tapered core dielectric elliptical fibers
by: CHOUDHURY, P, et al.
Published: (2007)
by: CHOUDHURY, P, et al.
Published: (2007)
Partial encryption of compressed images employing FPGA
by: Reaz, Mamun Bin Ibne Ibne, et al.
Published: (2005)
by: Reaz, Mamun Bin Ibne Ibne, et al.
Published: (2005)
Design and Implementation of an XML Firewall
by: Loh, Yin-soon, et al.
Published: (2006)
by: Loh, Yin-soon, et al.
Published: (2006)
Novel Technology Smartal Exploring The Student Problem Analyzer For Mathematics Module
by: Umar, Siti Noor Arfah
Published: (2009)
by: Umar, Siti Noor Arfah
Published: (2009)
Similar Items
-
Single core hardware module to implement encryption in TECB mode
by: Reaz, Mamun Bin Ibne, et al.
Published: (2007) -
Encryption in TECB mode: modeling, simulation and synthesis
by: Ibrahimy, Muhammad Ibn
Published: (2007) -
Hardware prototyping of an efficient encryption engine
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2010) -
Hardware prototyping of an efficient encryption engine
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2009) -
Design and implementation of a power quality disturbance classifier: An Al approach
by: Reaz, , M. B. I, et al.
Published: (2006)