Encryption using FPGA
Advanced Encryption Standard (AES), a Federal Information Processing Standard (FIPS), is an approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a block cipher that can encrypt and decrypt digital information. The AES algorithm is capable of using crypto...
| Main Author: | Nor Robaini, Ibrahim |
|---|---|
| Format: | Undergraduates Project Papers |
| Language: | English |
| Published: |
2008
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/421/ http://umpir.ump.edu.my/id/eprint/421/1/Encryption%20using%20FPGA.pdf |
Similar Items
Data transmission using aes encryption via email and sms
by: Arif Hanafi, Sharif Katullah
Published: (2013)
by: Arif Hanafi, Sharif Katullah
Published: (2013)
Data hiding in medical images using encryption and steganography techniques
by: Nur Athirah, Abdul Razak
Published: (2019)
by: Nur Athirah, Abdul Razak
Published: (2019)
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
by: Moh, Heng Huong
Published: (2014)
by: Moh, Heng Huong
Published: (2014)
UART Design, Integration and Synthesis on FPGA
by: Lee, Zhi Yong
Published: (2016)
by: Lee, Zhi Yong
Published: (2016)
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
by: Norrozila, Sulaiman, et al.
Published: (2013)
by: Norrozila, Sulaiman, et al.
Published: (2013)
Efficient architectures of heterogeneous fpga-gpu for 3-d medical image compression
by: Muharam, Azlan
Published: (2019)
by: Muharam, Azlan
Published: (2019)
A new secure storing system for biometric templates based encryption and concealment
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Design And Cryptanalysis Of Encryption And Signature Schemes Without Certificates
by: Yap, Wun She
Published: (2007)
by: Yap, Wun She
Published: (2007)
Security in robot operating system (ROS) by using Advanced Encryption Standard (AES)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
Partial encryption of compressed images employing FPGA
by: Reaz, Mamun Bin Ibne Ibne, et al.
Published: (2005)
by: Reaz, Mamun Bin Ibne Ibne, et al.
Published: (2005)
A Bayesian network-based framework with Constraint Satisfaction Problem (CSP)formulations for FPGA system design
by: Azman, Amelia Wong, et al.
Published: (2010)
by: Azman, Amelia Wong, et al.
Published: (2010)
Partial Encryption of Compressed Images Employing FPGA
by: Reaz, M.B.I., et al.
Published: (2005)
by: Reaz, M.B.I., et al.
Published: (2005)
The design of an FPGA-based processor with reconfigurable processor execution structure for internet of things (IoT) applications
by: Kiat, Wei Pau
Published: (2018)
by: Kiat, Wei Pau
Published: (2018)
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
by: Lim, Mui Liang
Published: (2006)
by: Lim, Mui Liang
Published: (2006)
Toolchain development and queue system enhanced security coprocessor for FPGA-based internet of things (IoT) processor
by: See, Jin Chuan
Published: (2019)
by: See, Jin Chuan
Published: (2019)
An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption
by: Keshav Kumar, Choudhary, et al.
Published: (2024)
by: Keshav Kumar, Choudhary, et al.
Published: (2024)
Implementing digital finite impulse response filter using FPGA
by: Razak, Abdul Hadi Abdul, et al.
Published: (2007)
by: Razak, Abdul Hadi Abdul, et al.
Published: (2007)
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
by: Khor, Lay Hoong
Published: (2006)
by: Khor, Lay Hoong
Published: (2006)
Accelerating FPGA-surf feature detection module by memory access reduction
by: Mohd. Yamani Idna, Idris, et al.
Published: (2019)
by: Mohd. Yamani Idna, Idris, et al.
Published: (2019)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
Secured MyVirtualPDA using advanced encryption standard
by: Md Taujuddin, Nik Shahidah Afifi, et al.
Published: (2009)
by: Md Taujuddin, Nik Shahidah Afifi, et al.
Published: (2009)
Features selection for IDS in encrypted traffic using genetic algorithm
by: Barati, Mehdi, et al.
Published: (2013)
by: Barati, Mehdi, et al.
Published: (2013)
FPGA implementation of RSA encryption engine with flexible key size
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2007)
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2007)
A New Image-Database Encryption Based on A Hybrid Approach of Data-at-Rest and Data-in-Motion Encryption Protocol.
by: Ooi, Bee Sien, et al.
Published: (2004)
by: Ooi, Bee Sien, et al.
Published: (2004)
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022)
by: Awadallah, Ruba N S
Published: (2022)
FPGA Implementation of Log-polar Mapping
by: Wong, Wai Kit, et al.
Published: (2008)
by: Wong, Wai Kit, et al.
Published: (2008)
An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
FPGA realization of mobile robot controller using fuzzy algorithm
by: Islam, Md. Shabiul, et al.
Published: (2007)
by: Islam, Md. Shabiul, et al.
Published: (2007)
Biometric Template Protection Using Watermarking with Hidden Password Encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
by: -, Salma, et al.
Published: (2019)
by: -, Salma, et al.
Published: (2019)
k-Resilient Identity-Based Encryption in the Standard Model
by: HENG, S.-H.
Published: (2006)
by: HENG, S.-H.
Published: (2006)
"무선 센서 네트워크에서 센서 노드들 사이의 메시지 암호화/복호화 방법" (Translated TITLE: Message encryption/ecryption method between sensor nodes in wireless sensor networks)
by: Pathan, Al-Sakib Khan, et al.
Published: (2010)
by: Pathan, Al-Sakib Khan, et al.
Published: (2010)
Biometric Template Protection using watermarking with hidden password encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Camera Sensor Network Localization Using FPGA
by: El-khatib, Lina Noaman, et al.
Published: (2010)
by: El-khatib, Lina Noaman, et al.
Published: (2010)
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
Consistency rules between UML use case and activity diagrams using logical approach
by: Noraini, Ibrahim, et al.
Published: (2011)
by: Noraini, Ibrahim, et al.
Published: (2011)
Image encryption algorithm based on chaotic mapping
by: Salleh, Mazleena, et al.
Published: (2003)
by: Salleh, Mazleena, et al.
Published: (2003)
Enhancement of social skills by using multimedia interactive social skills module application among students with autism spectrum disorder
by: Ibrahim, Zuraida
Published: (2019)
by: Ibrahim, Zuraida
Published: (2019)
Food ordering system using QR code
by: Nor Syamira Akilah, Mohamad Jaafar
Published: (2018)
by: Nor Syamira Akilah, Mohamad Jaafar
Published: (2018)
Development Of An 8-Bit Fpga-Based Asynchronous Risc Pipelined Processor For Data Encryption
by: Pang, Wai Leong
Published: (2003)
by: Pang, Wai Leong
Published: (2003)
Similar Items
-
Data transmission using aes encryption via email and sms
by: Arif Hanafi, Sharif Katullah
Published: (2013) -
Data hiding in medical images using encryption and steganography techniques
by: Nur Athirah, Abdul Razak
Published: (2019) -
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
by: Moh, Heng Huong
Published: (2014) -
UART Design, Integration and Synthesis on FPGA
by: Lee, Zhi Yong
Published: (2016) -
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
by: Norrozila, Sulaiman, et al.
Published: (2013)