Journal articles on the topic 'AES-GCM'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 31 journal articles for your research on the topic 'AES-GCM.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Jankowski, Krzysztof, and Pierre Laurent. "Packed AES-GCM Algorithm Suitable for AES/PCLMULQDQ Instructions." IEEE Transactions on Computers 60, no. 1 (January 2011): 135–38. http://dx.doi.org/10.1109/tc.2010.147.
Full textKim, Kyungho, Seungju Choi, Hyeokdong Kwon, Hyunjun Kim, Zhe Liu, and Hwajeong Seo. "PAGE—Practical AES-GCM Encryption for Low-End Microcontrollers." Applied Sciences 10, no. 9 (April 30, 2020): 3131. http://dx.doi.org/10.3390/app10093131.
Full textS. Bader, Ahmad, and Ali Makki Sagheer. "Modification on AES-GCM to Increment Ciphertext Randomness." International Journal of Mathematical Sciences and Computing 4, no. 4 (November 8, 2018): 34–40. http://dx.doi.org/10.5815/ijmsc.2018.04.03.
Full textZhang, Yong, Ning Wu, Fang Zhou, Xiaoqiang Zhang, and Jinbao Zhang. "High performance AES-GCM implementation based on efficient AES and FR-KOA multiplier." IEICE Electronics Express 15, no. 14 (2018): 20180559. http://dx.doi.org/10.1587/elex.15.20180559.
Full textAbdellatif, Karim M., Roselyne Chotin-Avot, and Habib Mehrez. "AES-GCM and AEGIS: Efficient and High Speed Hardware Implementations." Journal of Signal Processing Systems 88, no. 1 (January 29, 2016): 1–12. http://dx.doi.org/10.1007/s11265-016-1104-y.
Full textLi, Xiaoming, and James Huang. "Cache-collision side-channel analysis and attacks against AES-GCM." International Journal of Big Data Intelligence 7, no. 4 (2020): 211. http://dx.doi.org/10.1504/ijbdi.2020.10036404.
Full textHuang, James, and Xiaoming Li. "Cache-collision side-channel analysis and attacks against AES-GCM." International Journal of Big Data Intelligence 7, no. 4 (2020): 211. http://dx.doi.org/10.1504/ijbdi.2020.113875.
Full textSajjan, Rajani S., and Vijay R. Ghorpade. "GCM-AES-VR A Scheme for Cloud Data Confidentiality and Authenticity." International Journal of Computer Sciences and Engineering 6, no. 12 (December 31, 2018): 86–94. http://dx.doi.org/10.26438/ijcse/v6i12.8694.
Full textJamaluddin, Jamaluddin, Naikson Saragih, Roni Simamora, and Rimbun Siringoringo. "Konsep Pengamanan Video Conference Dengan Enkripsi AES-GCM Pada Aplikasi Zoom." METHOMIKA: Jurnal Manajemen Informatika dan Komputerisasi Akuntansi 4, no. 1 (October 17, 2020): 109–13. http://dx.doi.org/10.46880/jmika.v4i2.211.
Full textMozaffari-Kermani, Mehran, and Arash Reyhani-Masoleh. "Efficient and High-Performance Parallel Hardware Architectures for the AES-GCM." IEEE Transactions on Computers 61, no. 8 (August 2012): 1165–78. http://dx.doi.org/10.1109/tc.2011.125.
Full textLu, Ye, Tao Feng, and Guohua Ma. "Secure DNP3 Services Scheme in Smart Grid Link Layer Based on GCM-AES." International Journal of Security and Its Applications 10, no. 8 (August 31, 2016): 131–44. http://dx.doi.org/10.14257/ijsia.2016.10.8.11.
Full textAbdalrahman, Alameen. "A Cloud Database based on AES 256 GCM Encryption Through Devolving Web application of Accounting Information System." International Journal of Recent Technology and Engineering 9, no. 5 (January 30, 2021): 216–21. http://dx.doi.org/10.35940/ijrte.e5269.019521.
Full textLiu, Zhenglin, Qingchun Zhu, Dongfang Li, and Xuecheng Zou. "Off-Chip Memory Encryption and Integrity Protection Based on AES-GCM in Embedded Systems." IEEE Design & Test 30, no. 5 (October 2013): 54–62. http://dx.doi.org/10.1109/mdat.2013.2255912.
Full textZhang, Zhun, Xiang Wang, Qiang Hao, Dongdong Xu, Jinlei Zhang, Jiakang Liu, and Jinhui Ma. "High-Efficiency Parallel Cryptographic Accelerator for Real-Time Guaranteeing Dynamic Data Security in Embedded Systems." Micromachines 12, no. 5 (May 15, 2021): 560. http://dx.doi.org/10.3390/mi12050560.
Full textKankara, Mahidhara Reddy. "Encrypted e-Voting System using IoT." International Journal for Research in Applied Science and Engineering Technology 9, no. 9 (September 30, 2021): 453–60. http://dx.doi.org/10.22214/ijraset.2021.37973.
Full textMurali, A., and K. Hari Kishore. "Efficient and high speed key-independent AES-based authenticated encryption architecture using FPGAs." International Journal of Engineering & Technology 7, no. 1.5 (December 31, 2017): 230. http://dx.doi.org/10.14419/ijet.v7i1.5.9152.
Full textSovyn, Yaroslav, Volodymyr Khoma, and Michal Podpora. "Comparison of Three CPU-Core Families for IoT Applications in Terms of Security and Performance of AES-GCM." IEEE Internet of Things Journal 7, no. 1 (January 2020): 339–48. http://dx.doi.org/10.1109/jiot.2019.2953230.
Full textDiehl, William, Abubakr Abdulgadir, Farnoud Farahmand, Jens-Peter Kaps, and Kris Gaj. "Comparison of Cost of Protection against Differential Power Analysis of Selected Authenticated Ciphers." Cryptography 2, no. 3 (September 19, 2018): 26. http://dx.doi.org/10.3390/cryptography2030026.
Full textCampagna, Matthew, and Shay Gueron. "Key Management Systems at the Cloud Scale." Cryptography 3, no. 3 (September 5, 2019): 23. http://dx.doi.org/10.3390/cryptography3030023.
Full textMobilon, Eduardo, and Dalton Soares Arantes. "100 Gbit/s AES-GCM Cryptography Engine for Optical Transport Network Systems: Architecture, Design and 40 nm Silicon Prototyping." Microelectronics Journal 116 (October 2021): 105229. http://dx.doi.org/10.1016/j.mejo.2021.105229.
Full textSeo, Seog Chung, and Donggeun Kwon. "Highly Efficient SCA-Resistant Binary Field Multiplication on 8-Bit AVR Microcontrollers." Applied Sciences 10, no. 8 (April 19, 2020): 2821. http://dx.doi.org/10.3390/app10082821.
Full textTeh, Je Sen, and Azman Samsudin. "A Chaos-Based Authenticated Cipher with Associated Data." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/9040518.
Full textGudodagi, Raveendra, and R. Venkata Siva Reddy. "Security Provisioning and Compression of Diverse Genomic Data based on Advanced Encryption Standard (AES) Algorithm." International Journal of Biology and Biomedical Engineering 15 (May 14, 2021): 104–12. http://dx.doi.org/10.46300/91011.2021.15.14.
Full textIwata, Tetsu, and Yannick Seurin. "Reconsidering the Security Bound of AES-GCM-SIV." IACR Transactions on Symmetric Cryptology, December 15, 2017, 240–67. http://dx.doi.org/10.46586/tosc.v2017.i4.240-267.
Full text"Data Privacy Preservation using AES-GCM Encryption in Heroku Cloud." International Journal of Recent Technology and Engineering 8, no. 3 (September 30, 2019): 7544–48. http://dx.doi.org/10.35940/ijrte.c6131.098319.
Full textMennink, Bart, and Samuel Neves. "Optimal PRFs from Blockcipher Designs." IACR Transactions on Symmetric Cryptology, September 19, 2017, 228–52. http://dx.doi.org/10.46586/tosc.v2017.i3.228-252.
Full textMarshall, Ben, G. Richard Newell, Dan Page, Markku-Juhani O. Saarinen, and Claire Wolf. "The design of scalar AES Instruction Set Extensions for RISC-V." IACR Transactions on Cryptographic Hardware and Embedded Systems, December 3, 2020, 109–36. http://dx.doi.org/10.46586/tches.v2021.i1.109-136.
Full text"Implementation of AES-GCM encryption algorithm for high performance and low power architecture Using FPGA." International Journal of Research and Applications 1, no. 3 (September 15, 2014): 120–31. http://dx.doi.org/10.17812/ijra.1.3(26)2014.
Full textSakamoto, Kosei, Fukang Liu, Yuto Nakano, Shinsaku Kiyomoto, and Takanori Isobe. "Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G." IACR Transactions on Symmetric Cryptology, June 11, 2021, 1–30. http://dx.doi.org/10.46586/tosc.v2021.i2.1-30.
Full textNawal, Aishwarya, Harish Soni, Shweta Arewar, and Varshita Gangadhara. "Secure File Storage On Cloud Using Hybrid Cryptography." International Journal of Advanced Research in Science, Communication and Technology, May 6, 2021, 79–83. http://dx.doi.org/10.48175/ijarsct-1101.
Full textBhattacharya, Srimanta, and Mridul Nandi. "Revisiting Variable Output Length XOR Pseudorandom Function." IACR Transactions on Symmetric Cryptology, March 1, 2018, 314–35. http://dx.doi.org/10.46586/tosc.v2018.i1.314-335.
Full text