Methods for improving the implementation of advanced encryption standard hardware accelerator on field programmable gate array‐A survey (Englisch)
- Neue Suche nach: Renugadevi, N.
- Neue Suche nach: Thangallapally, Shirisha
- Neue Suche nach: Vemula, Sai Charan
- Neue Suche nach: Julakanti, Stheya
- Neue Suche nach: Bhatnagar, Somya
- Neue Suche nach: Renugadevi, N.
- Neue Suche nach: Thangallapally, Shirisha
- Neue Suche nach: Vemula, Sai Charan
- Neue Suche nach: Julakanti, Stheya
- Neue Suche nach: Bhatnagar, Somya
In:
Security and Privacy
;
5
, 6
;
2022
-
ISSN:
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:Methods for improving the implementation of advanced encryption standard hardware accelerator on field programmable gate array‐A survey
-
Beteiligte:Renugadevi, N. ( Autor:in ) / Thangallapally, Shirisha ( Autor:in ) / Vemula, Sai Charan ( Autor:in ) / Julakanti, Stheya ( Autor:in ) / Bhatnagar, Somya ( Autor:in )
-
Erschienen in:Security and Privacy ; 5, 6
-
Verlag:
- Neue Suche nach: Wiley Periodicals, Inc.
-
Erscheinungsdatum:01.11.2022
-
Format / Umfang:15 pages
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis – Band 5, Ausgabe 6
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
-
A construction of Chebyshev chaotic map based authenticated key agreement protocol for satellite communication systemDharminder, Dharminder / Nehra, Ankur / Arya, Aditya et al. | 2022
-
Phishing website detection: How effective are deep learning‐based models and hyperparameter optimization?Almousa, May / Zhang, Tianyang / Sarrafzadeh, Abdolhossein / Anwar, Mohd et al. | 2022
-
Decentralized trade finance using blockchain and lightning networkKumar, Shivansh / Amin, Ruhul et al. | 2022
-
Methods for improving the implementation of advanced encryption standard hardware accelerator on field programmable gate array‐A surveyRenugadevi, N. / Thangallapally, Shirisha / Vemula, Sai Charan / Julakanti, Stheya / Bhatnagar, Somya et al. | 2022
-
Chaotic neural networks and farfalle construction based parallel keyed secure hash functionBelal, Mohamad Mulham / Maitra, Tanmoy / Giri, Debasis / Das, Ashok Kumar et al. | 2022
-
Automated Windows behavioral tracing for malware analysisRana, Shubham / Kumar, Nitesh / Handa, Anand / Shukla, Sandeep K. et al. | 2022
-
Issue Information| 2022
-
Fake news detection using deep learning integrating feature extraction, natural language processing, and statistical descriptorsMadani, Mirmorsal / Motameni, Homayun / Mohamadi, Hosein et al. | 2022
-
Skew‐cyclic codes based public‐key cryptosystem approachGüzeltepe, Murat / Çalkavur, Selda et al. | 2022
-
Perfect secret sharing schemes from combinatorial squaresSaurabh, Shyam / Sinha, Kishore et al. | 2022
-
Private record linkage with linkage mapsPatel, Shreya / Dewri, Rinku et al. | 2022
-
“Security Gap” as a metric for enterprise business processesMukherjee, Preetam / Sengupta, Anirban / Mazumdar, Chandan et al. | 2022
-
Entropy service for secure real‐time mission critical communicationsZeydan, Engin / Turk, Yekta / Tasbag, Yaman Yagiz et al. | 2022