期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Reconfigurable implementation of AES algorithm IP core based on pipeline structure 被引量:6
1
作者 李冰 夏克维 梁文丽 《Journal of Southeast University(English Edition)》 EI CAS 2010年第1期21-25,共5页
In order to improve the data throughput of the advanced encryption standard (AES) IP core while reducing the hardware resource consumption and finally achieving a tradeoff between speed and area, a mixed pipeline ar... In order to improve the data throughput of the advanced encryption standard (AES) IP core while reducing the hardware resource consumption and finally achieving a tradeoff between speed and area, a mixed pipeline architecture and reconfigurable technology for the design and implementation of the AES IP core is proposed. The encryption and decryption processes of the AES algorithm are achieved in the same process within the mixed pipeline structure. According to the finite field characterizations, the Sbox in the AES algorithm is optimized. ShiftRow and MixColumn, which are the main components in AES round transformation, are optimized with the reconfigurable technology. The design is implemented on the Xilinx Virtex2p xc2vp20-7 field programmable gate array (FPGA) device. It can achieve a data throughput above 2.58 Gbit/s, and it only requires 3 233 slices. Compared with other related designs of AES IP cores on the same device, the proposed design can achieve a tradeoff between speed and area, and obtain satisfactory results in both data throughput and hardware resource consumption. 展开更多
关键词 advanced encryption standard aes algorithm RECONFIGURABLE PIPELINE finite field round transformation
下载PDF
A Complex Encryption System Design Implemented by AES 被引量:1
2
作者 Zhimao Lu Houmed Mohamed 《Journal of Information Security》 2021年第2期177-187,共11页
With the rapid development of internet technology and the increasing popularity of e-commerce, data encryption technology plays a very important role in data security. Information security has two aspects: security pr... With the rapid development of internet technology and the increasing popularity of e-commerce, data encryption technology plays a very important role in data security. Information security has two aspects: security protocol and cryptographic algorithm and the latter is the foundation and core technology of information security. Advanced Encryption Standard (AES) encryption algorithm is one of the most commonly used algorithms in symmetric encryption algorithms. Such algorithms face issues when used in the context of key management and security functions. This paper focuses on the systematic analysis of these issues and summarizes AES algorithm implementation, comprehensive application and algorithm comparison with other existing methods. To analyze the performance of the proposed algorithm and to make full use of the advantages of AES encryption algorithm, one needs to reduce round key and improve the key schedule, as well as organically integrate with RSA algorithm. Java language is used to implement the algorithm due to its large library, then to show the efficiency of the proposed method we compare different parameters, such as encryption/decryption speed, entropies and memory consumption...) with a classic algorithm. Based on the results of the comparison between AES and the hybrid AES algorithm, the proposed algorithm shows good performance and high security. It therefore can be used for key management and security functions, particularly for sharing sensitive files through insecure channel. This analysis provides a reference useful for selecting different encryption algorithms according to different business needs. 展开更多
关键词 aes algorithm RSA algorithm ENCRYPTION Key Management
下载PDF
Dynamically Reconfigurable Encryption System of the AES
3
作者 WANG Youren WANG Li YAO Rui ZHANG Zhai CUI Jiang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1569-1572,共4页
Reconfigurable computing has grown to become an important and large field of research, it offers advantages over traditional hardware and software implementations of computational algorithms. The Advanced Encryption S... Reconfigurable computing has grown to become an important and large field of research, it offers advantages over traditional hardware and software implementations of computational algorithms. The Advanced Encryption Standard (AES) algorithm is widely applied in government department and commerce. This paper analyzed the AES algorithms with different cipher keys, adopted a novel key scheduler that generated the round key real-time, proposed a dynamically reconfigurable encryption system which supported the AES algorithm with different cipher keys, and designed the architecture of the reconfigurable system. The dynamically reconfigurable AES system had been realized on FPGA. The result proves that the reconfigurable AES system is flexible, lower cost and high security level. 展开更多
关键词 dynamically reconfigurable hardware field programmable gate array (FPGA) advanced encryption standard aes algorithm cipher key
下载PDF
Proposed Privacy Preservation Technique for Color Medical Images
4
作者 Walid El-Shafai Hayam A.Abd El-Hameed +4 位作者 Noha A.El-Hag Ashraf A.M.Khalaf Naglaa F.Soliman Hussah Nasser AlEisa Fathi E.Abd El-Samie 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期719-732,共14页
Nowadays,the security of images or information is very important.This paper introduces a proposed hybrid watermarking and encryption technique for increasing medical image security.First,the secret medical image is en... Nowadays,the security of images or information is very important.This paper introduces a proposed hybrid watermarking and encryption technique for increasing medical image security.First,the secret medical image is encrypted using Advanced Encryption Standard(AES)algorithm.Then,the secret report of the patient is embedded into the encrypted secret medical image with the Least Significant Bit(LSB)watermarking algorithm.After that,the encrypted secret medical image with the secret report is concealed in a cover medical image,using Kekre’s Median Codebook Generation(KMCG)algorithm.Afterwards,the stego-image obtained is split into 16 parts.Finally,it is sent to the receiver.We adopt this strategy to send the secret medical image and report over a network securely.The proposed technique is assessed with different encryption quality metrics including Peak Signal-to-Noise Ratio(PSNR),Correlation Coefficient(Cr),Fea-ture Similarity Index Metric(FSIM),and Structural Similarity Index Metric(SSIM).Histogram estimation is used to confirm the matching between the secret medical image before and after transmission.Simulation results demonstrate that the proposed technique achieves good performance with high quality of the received medical image and clear image details in a very short processing time. 展开更多
关键词 LSB steganography aes algorithm KMCG algorithm
下载PDF
PARAMETERS OPTIMIZATION OF CONTINUOUS WAVELET TRANSFORM AND ITS APPLICATION IN ACOUSTIC EMISSION SIGNAL ANALYSIS OF ROLLING BEARING 被引量:7
5
作者 ZHANG Xinming HE Yongyong HAO Rujiang CHU Fulei 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2007年第2期104-108,共5页
Morlet wavelet is suitable to extract the impulse components of mechanical fault signals. And thus its continuous wavelet transform (CWT) has been successfully used in the field of fault diagnosis. The principle of ... Morlet wavelet is suitable to extract the impulse components of mechanical fault signals. And thus its continuous wavelet transform (CWT) has been successfully used in the field of fault diagnosis. The principle of scale selection in CWT is discussed. Based on genetic algorithm, an optimization strategy for the waveform parameters of the mother wavelet is proposed with wavelet entropy as the optimization target. Based on the optimized waveform parameters, the wavelet scalogram is used to analyze the simulated acoustic emission (AE) signal and real AE signal of rolling bearing. The results indicate that the proposed method is useful and efficient to improve the quality of CWT. 展开更多
关键词 Rolling bearing Fault diagnosis Acoustic emission (AE) Continuous wavelet transform (CWT) Genetic algorithm
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部