The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security is the major aspect in any type of communication systems. The generation of secret keys randomly provides good security as well as better complexity in cryptographic based algorithms. In literature there exist symmetric key algorithms which use the same key for encryption as well as decryption. Among all the algorithms, Advanced Encryption Standard (AES) is used in many fields of security...
AES algorithm or Rijndael algorithm is a network security algorithm which is most commonly used in all types of wired and wireless digital communication networks for secure transmission of data between two end users, especially over a public network. This paper presents the hardware implementation of AES Rijndael Encryption and Decryption Algorithm by using Xilinx Virtex-7 FPGA. The hardware design...
In this paper, we propose an efficient compression/decompression technology and encryption/decryption technology for a multimedia communication system. In order to reduce the volume of multimedia data over wireless channels, data compression techniques are widely used. Discrete cosine transform (DCT) is one of the major compression Scheme. Hence, we present Dynamic bit-width adaptation scheme in discrete...
This paper will present the design, implementation and performance of a FIPS - approved cryptographic algorithm - Advanced Encryption Standard (AES), which can be used to protect electronic data. This system consists of two main components: cipher and key-expansion. Furthermore, there are four small parts in process of cipher: subbytes and its inverse, shiftrows and its inverse, mixcolumns and its...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.