Zobrazeno 1 - 10
of 190
pro vyhledávání: '"Galois/Counter Mode"'
Publikováno v:
Jisuanji kexue, Vol 49, Iss 10, Pp 74-82 (2022)
In the context of vigorous development of big data and 5G technology,information encryption in high-speed communication systems has become a new research hotspot.How to increase data throughput and reduce the difficulty of adapting encryption algorit
Externí odkaz:
https://doaj.org/article/96135637e6a943fb9c576b3b38568a2f
Autor:
Nsikak P. Owoh, M. Mahinderjit Singh
Publikováno v:
Applied Computing and Informatics, Vol 18, Iss 1/2, Pp 2-21 (2022)
The proliferation of mobile phones with integrated sensors makes large scale sensing possible at low cost. During mobile sensing, data mostly contain sensitive information of users such as their real-time location. When such information are not effec
Externí odkaz:
https://doaj.org/article/b4239e9bb7eb4b5bb53a8f8446b090ea
Autor:
Seog Chung Seo, HeeSeok Kim
Publikováno v:
IEEE Access, Vol 7, Pp 103961-103978 (2019)
Galois/counter mode (GCM) is one of the most widely used authenticated encryptions. To date, even though some works have investigated the security against side channel analysis (SCA) in the process of GCM computation, especially GHASH function, they
Externí odkaz:
https://doaj.org/article/1e124259aae448949f9ccc6447920783
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Seog Chung Seo, Donggeun Kwon
Publikováno v:
Applied Sciences, Vol 10, Iss 8, p 2821 (2020)
Binary field ( B F ) multiplication is a basic and important operation for widely used crypto algorithms such as the GHASH function of GCM (Galois/Counter Mode) mode and NIST-compliant binary Elliptic Curve Cryptosystems (ECCs). Recently, Seo et al.
Externí odkaz:
https://doaj.org/article/a2a092f56f6746a5a9e54cd44779dfeb
Publikováno v:
Applied Sciences, Vol 10, Iss 9, p 3131 (2020)
An optimized AES (Advanced Encryption Standard) implementation of Galois Counter Mode of operation (GCM) on low-end microcontrollers is presented in this paper. Two optimization methods are applied to proposed implementations. First, the AES counter
Externí odkaz:
https://doaj.org/article/110e7e39a3f5414b911ff937bdf49d32
Publikováno v:
Applied Computing and Informatics. 18:2-21
The proliferation of mobile phones with integrated sensors makes large scale sensing possible at low cost. During mobile sensing, data mostly contain sensitive information of users such as their real-time location. When such information are not effec
Publikováno v:
IEEE Access, Vol 8, Pp 48543-48556 (2020)
High-speed data communication is becoming essential for many applications, including satellite communication. The security algorithms associated with the communication of information are also required to have high-speed for coping up with the communi
Publikováno v:
IEEE Transactions on Reliability. 68:1347-1355
To augment the confidentiality property provided by block ciphers with authentication, the Galois Counter Mode (GCM) has been standardized by the National Institute of Standards and Technology. The GCM is used as an add-on to 128-bit block ciphers, s
Publikováno v:
Applied Sciences
Volume 10
Issue 9
Applied Sciences, Vol 10, Iss 3131, p 3131 (2020)
Volume 10
Issue 9
Applied Sciences, Vol 10, Iss 3131, p 3131 (2020)
An optimized AES (Advanced Encryption Standard) implementation of Galois Counter Mode of operation (GCM) on low-end microcontrollers is presented in this paper. Two optimization methods are applied to proposed implementations. First, the AES counter