Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
In recent years security has been a common concern for the data in-transit between communication networks as well as data at-rest in storage devices. Storage encryption (data at-rest) has now become an important aspect in today’s computing environment. User data stored in computing devices that inc...
| Main Author: | Ahmed, Shakil |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2013
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/47942/ http://psasir.upm.edu.my/id/eprint/47942/1/FK%202013%2032R.pdf |
Similar Items
A modified approach to improve the performance of AES using feistel structure
by: Al-Ansi, Afeef Yahya Ahmed
Published: (2018)
by: Al-Ansi, Afeef Yahya Ahmed
Published: (2018)
Enhancing performance of XTS cryptography mode of operation using parallel design
by: Ahmed Alomari, Mohammad
Published: (2009)
by: Ahmed Alomari, Mohammad
Published: (2009)
A faster version of rijndael cryptographic algorithm using
cyclic shift and bit wise operations
by: Mohd Ali, Fakariah Hani, et al.
Published: (2009)
by: Mohd Ali, Fakariah Hani, et al.
Published: (2009)
Improving The Randomness of Output Sequence for The Advanced Encryption Standard Cryptographic Algorithm
by: Abdulbari Ali, Sherif
Published: (2005)
by: Abdulbari Ali, Sherif
Published: (2005)
Development of DNA-based dynamic key-dependent block cipher
by: Saeed, Auday H.
Published: (2015)
by: Saeed, Auday H.
Published: (2015)
Security Study and Encryption / Decryption Method
by: Al-Qdah, Majdi Taysir
Published: (2000)
by: Al-Qdah, Majdi Taysir
Published: (2000)
Key Transformation Approach for Rijndael Security
by: Sulong, Mek Rahmah
Published: (2008)
by: Sulong, Mek Rahmah
Published: (2008)
Effective implementation of AES-XTS on FPGA
by: Ahmed, Shakil, et al.
Published: (2011)
by: Ahmed, Shakil, et al.
Published: (2011)
Design of robust and fragile image watermarking system for copyright protection and authentication using lifting wavelet transform and bivariate empirical mode decomposition techniques
by: Abbas, Nidaa Hasan
Published: (2017)
by: Abbas, Nidaa Hasan
Published: (2017)
The vulnerability analysis and the security evaluation of block ciphers
by: Rezaeipour, Davood, et al.
Published: (2010)
by: Rezaeipour, Davood, et al.
Published: (2010)
Dynamic determinant matrix-based block cipher algorithm
by: Juremi, Julia
Published: (2018)
by: Juremi, Julia
Published: (2018)
Improved Algebraic Cryptanalysis of the Reduced-Round Advanced Encryption Standard
by: Rezaeipour, Davood
Published: (2011)
by: Rezaeipour, Davood
Published: (2011)
Some statistical simulation results over the 128-bit block cipher CLEFIA
by: Rezaeipour, Davood, et al.
Published: (2009)
by: Rezaeipour, Davood, et al.
Published: (2009)
Hybrid cryptography algorithm to improve security cloud storage
by: Abd Almohsen, Inam Razzaq
Published: (2017)
by: Abd Almohsen, Inam Razzaq
Published: (2017)
Effects of variation theory-based strategy on form two students' algebraic achievement and motivation
by: Ting, Jing Jing
Published: (2016)
by: Ting, Jing Jing
Published: (2016)
Secret sharing scheme for key management of secure data sharing in cloud
by: Abd Majid, Noorhafezan
Published: (2019)
by: Abd Majid, Noorhafezan
Published: (2019)
Development of authentication code based on spectral amplitude coding optical code division multiplexing for multi-user pseudo quantum key distribution
by: Abiola, Taiwo Ambali
Published: (2018)
by: Abiola, Taiwo Ambali
Published: (2018)
Encryption selection for WLAN IEEE802.11G
by: Ahmad, Zahrol Azam
Published: (2013)
by: Ahmad, Zahrol Azam
Published: (2013)
Performance optimization of cloud storage in access control of Ciphertext Policy Attribute-based Encryption
by: Mohd Satar, Siti Dhalila
Published: (2023)
by: Mohd Satar, Siti Dhalila
Published: (2023)
Performance analysis and improvement of rabin primitive based cryptosystems
by: Mahad, Zahari
Published: (2014)
by: Mahad, Zahari
Published: (2014)
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
by: Jamal, Fara
Published: (2021)
by: Jamal, Fara
Published: (2021)
Design and performance evaluation of parallel elliptic curve cryptosystem with GF(P) projective coordinates
by: Hussein Fayiz, Mohammad Al-Khatib
Published: (2012)
by: Hussein Fayiz, Mohammad Al-Khatib
Published: (2012)
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
by: Md Yasin, Sharifah
Published: (2011)
by: Md Yasin, Sharifah
Published: (2011)
Sharp-Edges Steganography in Arabic Characters for Information Hiding
by: Roslan, Nuur Alifah
Published: (2011)
by: Roslan, Nuur Alifah
Published: (2011)
Multimodal fingerprint and face biometrics with fragile watermarking and convolutional neural network
by: Najih, Abdulmawla
Published: (2020)
by: Najih, Abdulmawla
Published: (2020)
New compendium of RSA vulnerabilities
by: Abd Ghafar, Amir Hamzah
Published: (2020)
by: Abd Ghafar, Amir Hamzah
Published: (2020)
Improved security of Rijndael key expansion function
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
by: Shereek, Balkees Mohamed
Published: (2016)
by: Shereek, Balkees Mohamed
Published: (2016)
A framework for GPU-accelerated AES-XTS encryption in mobile devices
by: Alomari, Mohammad Ahmed, et al.
Published: (2011)
by: Alomari, Mohammad Ahmed, et al.
Published: (2011)
Data filtering framework for preserving meaningful data records from streams of unstructured weather data
by: Al-Zyadat, Wa'el Jum'ah
Published: (2014)
by: Al-Zyadat, Wa'el Jum'ah
Published: (2014)
Securing the image through the combination of elliptic curve cryptosystem and hill cipher encryption
by: Sulaiman, Saniah
Published: (2019)
by: Sulaiman, Saniah
Published: (2019)
A collision resistant cryptographic hash function based on cellular automata rules
by: Jamil, Norziana
Published: (2013)
by: Jamil, Norziana
Published: (2013)
Implementation of data security system in Tabung Haji and SOCSO
by: Ahmad, Jasmin Ilyani
Published: (2003)
by: Ahmad, Jasmin Ilyani
Published: (2003)
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
by: Alomari, Mohammad Ahmed Mohammad
Published: (2017)
by: Alomari, Mohammad Ahmed Mohammad
Published: (2017)
Information Security Analysis and Solution using LSB Steganography and
AES Cryptographic Algorithm
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
Access control model based on trust, purpose, and role in materialized view for privacy protection
by: Salji, Mohd Rafiz
Published: (2019)
by: Salji, Mohd Rafiz
Published: (2019)
The impact of security on VoIP call quality
by: Radmand, Pedram, et al.
Published: (2011)
by: Radmand, Pedram, et al.
Published: (2011)
The complexity of extracting knowledge in Big Data / Rozianiwati Yusof...[et al.]
by: Yusof, Rozianiwati, et al.
Published: (2016)
by: Yusof, Rozianiwati, et al.
Published: (2016)
Enhanced normalization approach to address stop-word complexity in compound-word schema labels
by: Hossain, Jafreen
Published: (2014)
by: Hossain, Jafreen
Published: (2014)
CCS 524 PARALLEL COMPUTING ARCHITECTURES AND ALGORITHMS NOV 2008
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
Similar Items
-
A modified approach to improve the performance of AES using feistel structure
by: Al-Ansi, Afeef Yahya Ahmed
Published: (2018) -
Enhancing performance of XTS cryptography mode of operation using parallel design
by: Ahmed Alomari, Mohammad
Published: (2009) -
A faster version of rijndael cryptographic algorithm using
cyclic shift and bit wise operations
by: Mohd Ali, Fakariah Hani, et al.
Published: (2009) -
Improving The Randomness of Output Sequence for The Advanced Encryption Standard Cryptographic Algorithm
by: Abdulbari Ali, Sherif
Published: (2005) -
Development of DNA-based dynamic key-dependent block cipher
by: Saeed, Auday H.
Published: (2015)