An embedded cryptosystem implementing symmetric cipher and public-key crypto algorithms in hardware
Information security in terms of confidentiality, data integrity, nonrepudiation and authentication is one of the critical aspects in majority of electronic communication and computer networks, especially in high speed security system. This thesis proposes an embedded cryptosystem design prototype,...
| Main Author: | Hau, Yuan Wen |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2005
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/4287/ http://eprints.utm.my/4287/1/HauYuanWenMFKE2005.pdf |
Similar Items
Design and implementation of a private and public key crypto processor for next-generation it security applications
by: Hani, Mohamed Khalil, et al.
Published: (2006)
by: Hani, Mohamed Khalil, et al.
Published: (2006)
Hardware Implementation Of Rc4a Stream Cipher Algorithm
by: Al Noman, Abdullah
Published: (2007)
by: Al Noman, Abdullah
Published: (2007)
Crypto Embedded System for Electronic Document
by: Ahmad, Illiasaak, et al.
Published: (2006)
by: Ahmad, Illiasaak, et al.
Published: (2006)
The new variable-length key symmetric cryptosystem
by: Pour, Davood Rezaei, et al.
Published: (2009)
by: Pour, Davood Rezaei, et al.
Published: (2009)
Modified key size determination models for symmetric ciphers
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Hardware implementation of RC4A stream cipher
by: Al Noman, Abdullah, et al.
Published: (2009)
by: Al Noman, Abdullah, et al.
Published: (2009)
Implementation Of Hardware Software Partitioning In Embedded System
by: Mohd Nor, Masyirah
Published: (2018)
by: Mohd Nor, Masyirah
Published: (2018)
A true random number generator for crypto embedded systems
by: M.Thamrin, Norashikin, et al.
Published: (2006)
by: M.Thamrin, Norashikin, et al.
Published: (2006)
Visual Public-Key Cryptosystems.
by: Samsudin, Azman
Published: (2012)
by: Samsudin, Azman
Published: (2012)
AAβ-Cryptosystem: a chaos based public key cryptosystem
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
Biometric Template Protection based on Hill Cipher Algorithm with Two Invertible Keys
by: Khalaf, Emad Taha, et al.
Published: (2018)
by: Khalaf, Emad Taha, et al.
Published: (2018)
AAβ public-key cryptosystem - a practical implementation of the new asymmetric
by: Mahad, Zahari, et al.
Published: (2013)
by: Mahad, Zahari, et al.
Published: (2013)
Fast Public-Key Cryptosystems: Design And Cryptanalyses
by: Go, Bok Min
Published: (2006)
by: Go, Bok Min
Published: (2006)
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
by: Paniandi, Arul
Published: (2006)
by: Paniandi, Arul
Published: (2006)
A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC)
by: Taha, Imad, et al.
Published: (1999)
by: Taha, Imad, et al.
Published: (1999)
A new public key cryptosystem based on IFS
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2010)
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2010)
Comparative study of some symmetric ciphers in mobile systems
by: Jassim, Khalid Fadhil, et al.
Published: (2014)
by: Jassim, Khalid Fadhil, et al.
Published: (2014)
Securing the image through the combination of elliptic curve cryptosystem and hill cipher encryption
by: Sulaiman, Saniah
Published: (2019)
by: Sulaiman, Saniah
Published: (2019)
A symmetric cryptosystem based on nondeterministic finite automata
by: Khaleel, Ghassan, et al.
Published: (2017)
by: Khaleel, Ghassan, et al.
Published: (2017)
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
by: Daud, Muhamad Azlan
Published: (2014)
by: Daud, Muhamad Azlan
Published: (2014)
RC4A stream cipher for WLAN security: a hardware approach
by: Al Noman, Abdullah, et al.
Published: (2008)
by: Al Noman, Abdullah, et al.
Published: (2008)
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
by: Hassan Disina, Abdulkadir
Published: (2018)
by: Hassan Disina, Abdulkadir
Published: (2018)
Comparison analysis of stream cipher algorithms for digital communication
by: Mat Sidek, Abd. Rahim, et al.
Published: (2007)
by: Mat Sidek, Abd. Rahim, et al.
Published: (2007)
Hardware implementation of intelligent braking system
by: Sidek, Shahrul Na'im, et al.
Published: (2011)
by: Sidek, Shahrul Na'im, et al.
Published: (2011)
Key-dependent s-box in lightweight block ciphers
by: AlDabbagh, S.S.M., et al.
Published: (2014)
by: AlDabbagh, S.S.M., et al.
Published: (2014)
Security Analysis of a Public Key Cryptosystem for Synchronized Chaotic Systems
by: Mahad, Zahari, et al.
Published: (2022)
by: Mahad, Zahari, et al.
Published: (2022)
Implementation of hybrid encryption method using caesar cipher algorithm
by: Charomie, Tat Wi
Published: (2010)
by: Charomie, Tat Wi
Published: (2010)
Implementation of hybrid encryption method using caesar cipher algorithm
by: Tat Wi, Charomie
Published: (2010)
by: Tat Wi, Charomie
Published: (2010)
Computation of private key for LUC cryptosystem
by: Md Ali, Zulkarnain, et al.
Published: (2009)
by: Md Ali, Zulkarnain, et al.
Published: (2009)
AAβ public key cryptosystem - a new practical asymmetric implementation based on the square root problem
by: Mahad, Zahari, et al.
Published: (2012)
by: Mahad, Zahari, et al.
Published: (2012)
Design of an advanced encryption standard crypto-processor core for field programmable gate array implementation
by: Ismail, Mohd. Izuan
Published: (2006)
by: Ismail, Mohd. Izuan
Published: (2006)
Crypto-to-Crypto Transactions: A Modern Quandary in Realisation Taxation
by: Allen, Christina, et al.
Published: (2025)
by: Allen, Christina, et al.
Published: (2025)
A New Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Hardware implementation of intelligent braking system
by: Sidek, Shahrul Na'im, et al.
Published: (2001)
by: Sidek, Shahrul Na'im, et al.
Published: (2001)
Design and implementation of OFDM transmitter and receiver on FPGA hardware
by: Kadiran, Kamaru Adzha
Published: (2005)
by: Kadiran, Kamaru Adzha
Published: (2005)
A review on heuristics for addition chain problem: towards efficient public key cryptosystems
by: Muhammad Noma, Adamu, et al.
Published: (2017)
by: Muhammad Noma, Adamu, et al.
Published: (2017)
AAβ public key cryptosystem - a comparative analysis against RSA and ECC
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
A New Approach To Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: A. Alia, Mohammad Ahmad
Published: (2008)
by: A. Alia, Mohammad Ahmad
Published: (2008)
The effect of symmetric and asymmetric information on
volatility structure of crypto-currency markets: a case study of bitcoin currency
by: Othman, Anwar Hasan Abdullah, et al.
Published: (2019)
by: Othman, Anwar Hasan Abdullah, et al.
Published: (2019)
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
by: Hani, Mohamed Khalil, et al.
Published: (2000)
by: Hani, Mohamed Khalil, et al.
Published: (2000)
Similar Items
-
Design and implementation of a private and public key crypto processor for next-generation it security applications
by: Hani, Mohamed Khalil, et al.
Published: (2006) -
Hardware Implementation Of Rc4a Stream Cipher Algorithm
by: Al Noman, Abdullah
Published: (2007) -
Crypto Embedded System for Electronic Document
by: Ahmad, Illiasaak, et al.
Published: (2006) -
The new variable-length key symmetric cryptosystem
by: Pour, Davood Rezaei, et al.
Published: (2009) -
Modified key size determination models for symmetric ciphers
by: Ibrahim, Subariah, et al.
Published: (2005)