To see the other types of publications on this topic, follow the link: AES-GCM.

Journal articles on the topic 'AES-GCM'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 31 journal articles for your research on the topic 'AES-GCM.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Jankowski, Krzysztof, and Pierre Laurent. "Packed AES-GCM Algorithm Suitable for AES/PCLMULQDQ Instructions." IEEE Transactions on Computers 60, no. 1 (2011): 135–38. http://dx.doi.org/10.1109/tc.2010.147.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kim, Kyungho, Seungju Choi, Hyeokdong Kwon, Hyunjun Kim, Zhe Liu, and Hwajeong Seo. "PAGE—Practical AES-GCM Encryption for Low-End Microcontrollers." Applied Sciences 10, no. 9 (2020): 3131. http://dx.doi.org/10.3390/app10093131.

Full text
Abstract:
An optimized AES (Advanced Encryption Standard) implementation of Galois Counter Mode of operation (GCM) on low-end microcontrollers is presented in this paper. Two optimization methods are applied to proposed implementations. First, the AES counter (CTR) mode of operation is speed-optimized and ensures constant timing. The main idea is replacing expensive AES operations, including AddRound Key, SubBytes, ShiftRows, and MixColumns, into simple look-up table access. Unlike previous works, the look-up table does not require look-up table updates during the entire encryption life-cycle. Second, t
APA, Harvard, Vancouver, ISO, and other styles
3

S. Bader, Ahmad, and Ali Makki Sagheer. "Modification on AES-GCM to Increment Ciphertext Randomness." International Journal of Mathematical Sciences and Computing 4, no. 4 (2018): 34–40. http://dx.doi.org/10.5815/ijmsc.2018.04.03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Yong, Ning Wu, Fang Zhou, Xiaoqiang Zhang, and Jinbao Zhang. "High performance AES-GCM implementation based on efficient AES and FR-KOA multiplier." IEICE Electronics Express 15, no. 14 (2018): 20180559. http://dx.doi.org/10.1587/elex.15.20180559.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Abdellatif, Karim M., Roselyne Chotin-Avot, and Habib Mehrez. "AES-GCM and AEGIS: Efficient and High Speed Hardware Implementations." Journal of Signal Processing Systems 88, no. 1 (2016): 1–12. http://dx.doi.org/10.1007/s11265-016-1104-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Xiaoming, and James Huang. "Cache-collision side-channel analysis and attacks against AES-GCM." International Journal of Big Data Intelligence 7, no. 4 (2020): 211. http://dx.doi.org/10.1504/ijbdi.2020.10036404.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Huang, James, and Xiaoming Li. "Cache-collision side-channel analysis and attacks against AES-GCM." International Journal of Big Data Intelligence 7, no. 4 (2020): 211. http://dx.doi.org/10.1504/ijbdi.2020.113875.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sajjan, Rajani S., and Vijay R. Ghorpade. "GCM-AES-VR A Scheme for Cloud Data Confidentiality and Authenticity." International Journal of Computer Sciences and Engineering 6, no. 12 (2018): 86–94. http://dx.doi.org/10.26438/ijcse/v6i12.8694.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jamaluddin, Jamaluddin, Naikson Saragih, Roni Simamora, and Rimbun Siringoringo. "Konsep Pengamanan Video Conference Dengan Enkripsi AES-GCM Pada Aplikasi Zoom." METHOMIKA: Jurnal Manajemen Informatika dan Komputerisasi Akuntansi 4, no. 1 (2020): 109–13. http://dx.doi.org/10.46880/jmika.v4i2.211.

Full text
Abstract:
The conditions of the Covid-19 pandemic, which began to plague at the end of 2019, brought about major changes to the patterns of interaction in society. Activities that have been carried out directly have begun to shift to activities carried out online. The use of technology, especially in applications for online interaction patterns such as video conferencing applications, is an alternative. The Zoom Cloud Meeting application is widely used by people who initially had doubts about its security system. By implementing end-to-end encryption with AES-256-GCM, it has been able to convince client
APA, Harvard, Vancouver, ISO, and other styles
10

Mozaffari-Kermani, Mehran, and Arash Reyhani-Masoleh. "Efficient and High-Performance Parallel Hardware Architectures for the AES-GCM." IEEE Transactions on Computers 61, no. 8 (2012): 1165–78. http://dx.doi.org/10.1109/tc.2011.125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Lu, Ye, Tao Feng, and Guohua Ma. "Secure DNP3 Services Scheme in Smart Grid Link Layer Based on GCM-AES." International Journal of Security and Its Applications 10, no. 8 (2016): 131–44. http://dx.doi.org/10.14257/ijsia.2016.10.8.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Abdalrahman, Alameen. "A Cloud Database based on AES 256 GCM Encryption Through Devolving Web application of Accounting Information System." International Journal of Recent Technology and Engineering 9, no. 5 (2021): 216–21. http://dx.doi.org/10.35940/ijrte.e5269.019521.

Full text
Abstract:
The main objective of this research is to use AES 256 GCM encryption and decryption of a web application system database called Accounting Information System (AIS) for achieving more privacy and security in a cloud environment. A cloud environment provides many services such as software, platform, and infrastructure. AIS can use the cloud to store data to achieve accounting with more performance, efficiency, convenience, and cost reduction. On the other hand, cloud environment is not secure because data is kept away from the organization. This paper focuses on how we deal with secure sensitive
APA, Harvard, Vancouver, ISO, and other styles
13

Liu, Zhenglin, Qingchun Zhu, Dongfang Li, and Xuecheng Zou. "Off-Chip Memory Encryption and Integrity Protection Based on AES-GCM in Embedded Systems." IEEE Design & Test 30, no. 5 (2013): 54–62. http://dx.doi.org/10.1109/mdat.2013.2255912.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Zhang, Zhun, Xiang Wang, Qiang Hao, et al. "High-Efficiency Parallel Cryptographic Accelerator for Real-Time Guaranteeing Dynamic Data Security in Embedded Systems." Micromachines 12, no. 5 (2021): 560. http://dx.doi.org/10.3390/mi12050560.

Full text
Abstract:
Dynamic data security in embedded systems is raising more and more concerns in numerous safety-critical applications. In particular, the data exchanges in embedded Systems-on-Chip (SoCs) using main memory are exposing many security vulnerabilities to external attacks, which will cause confidential information leakages and program execution failures for SoCs at key points. Therefore, this paper presents a security SoC architecture with integrating a four-parallel Advanced Encryption Standard-Galois/Counter Mode (AES-GCM) cryptographic accelerator for achieving high-efficiency data processing to
APA, Harvard, Vancouver, ISO, and other styles
15

Kankara, Mahidhara Reddy. "Encrypted e-Voting System using IoT." International Journal for Research in Applied Science and Engineering Technology 9, no. 9 (2021): 453–60. http://dx.doi.org/10.22214/ijraset.2021.37973.

Full text
Abstract:
Abstract: Elections make a fundamental contribution to democratic governance but a lack of trust among citizens on their electoral system is a hindrance to satisfy the legal requirements of legislators. Even the world’s largest democratic countries suffer from issues like vote rigging, election manipulation and hacking of the electronic voting machines in the current voting system. To provide data security for e-Voting systems, the advanced encryption standard (AES) algorithm has been proposed, but traditional AES gives the same ciphertext for every similar pair of key and plaintext. So, to el
APA, Harvard, Vancouver, ISO, and other styles
16

Murali, A., and K. Hari Kishore. "Efficient and high speed key-independent AES-based authenticated encryption architecture using FPGAs." International Journal of Engineering & Technology 7, no. 1.5 (2017): 230. http://dx.doi.org/10.14419/ijet.v7i1.5.9152.

Full text
Abstract:
Data manipulations are made with the use of communication and networking systems. But at the same time, data integrity is also a needed and important property that must be maintained in every data communicating systems. For this, the security levels are provided with cryptographic primitives like hash functions and block ciphers which are deployed into the systems. For efficient architectures, FPGA-based systems like AES-GCM and AEGIS-128 plays in the best part of the re-configurability, which supports the security services of such communication and networking systems. We possibly focus on the
APA, Harvard, Vancouver, ISO, and other styles
17

Sovyn, Yaroslav, Volodymyr Khoma, and Michal Podpora. "Comparison of Three CPU-Core Families for IoT Applications in Terms of Security and Performance of AES-GCM." IEEE Internet of Things Journal 7, no. 1 (2020): 339–48. http://dx.doi.org/10.1109/jiot.2019.2953230.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Diehl, William, Abubakr Abdulgadir, Farnoud Farahmand, Jens-Peter Kaps, and Kris Gaj. "Comparison of Cost of Protection against Differential Power Analysis of Selected Authenticated Ciphers." Cryptography 2, no. 3 (2018): 26. http://dx.doi.org/10.3390/cryptography2030026.

Full text
Abstract:
Authenticated ciphers, which combine the cryptographic services of confidentiality, integrity, and authentication into one algorithmic construct, can potentially provide improved security and efficiencies in the processing of sensitive data. However, they are vulnerable to side-channel attacks such as differential power analysis (DPA). Although the Test Vector Leakage Assessment (TVLA) methodology has been used to confirm improved resistance of block ciphers to DPA after application of countermeasures, extension of TVLA to authenticated ciphers is non-trivial, since authenticated ciphers have
APA, Harvard, Vancouver, ISO, and other styles
19

Campagna, Matthew, and Shay Gueron. "Key Management Systems at the Cloud Scale." Cryptography 3, no. 3 (2019): 23. http://dx.doi.org/10.3390/cryptography3030023.

Full text
Abstract:
This paper describes a cloud-scale encryption system. It discusses the constraints that shaped the design of Amazon Web Services’ Key Management Service, and in particular, the challenges that arise from using a standard mode of operation such as AES-GCM while safely supporting huge amounts of encrypted data that is (simultaneously) generated and consumed by a huge number of users employing different keys. We describe a new derived-key mode that is designed for this multi-user-multi-key scenario typical at the cloud scale. Analyzing the resulting security bounds of this model illustrates its a
APA, Harvard, Vancouver, ISO, and other styles
20

Mobilon, Eduardo, and Dalton Soares Arantes. "100 Gbit/s AES-GCM Cryptography Engine for Optical Transport Network Systems: Architecture, Design and 40 nm Silicon Prototyping." Microelectronics Journal 116 (October 2021): 105229. http://dx.doi.org/10.1016/j.mejo.2021.105229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Seo, Seog Chung, and Donggeun Kwon. "Highly Efficient SCA-Resistant Binary Field Multiplication on 8-Bit AVR Microcontrollers." Applied Sciences 10, no. 8 (2020): 2821. http://dx.doi.org/10.3390/app10082821.

Full text
Abstract:
Binary field ( B F ) multiplication is a basic and important operation for widely used crypto algorithms such as the GHASH function of GCM (Galois/Counter Mode) mode and NIST-compliant binary Elliptic Curve Cryptosystems (ECCs). Recently, Seo et al. proposed a novel SCA-resistant binary field multiplication method in the context of GHASH optimization in AES GCM mode on 8-bit AVR microcontrollers (MCUs). They proposed a concept of Dummy XOR operation with a kind of garbage registers and a concept of instruction level atomicity ( I L A ) for resistance against Timing Analysis (TA) and Simple Pow
APA, Harvard, Vancouver, ISO, and other styles
22

Teh, Je Sen, and Azman Samsudin. "A Chaos-Based Authenticated Cipher with Associated Data." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/9040518.

Full text
Abstract:
In recent years, there has been a rising interest in authenticated encryption with associated data (AEAD) which combines encryption and authentication into a unified scheme. AEAD schemes provide authentication for a message that is divided into two parts: associated data which is not encrypted and the plaintext which is encrypted. However, there is a lack of chaos-based AEAD schemes in recent literature. This paper introduces a new 128-bit chaos-based AEAD scheme based on the single-key Even-Mansour and Type-II generalized Feistel structure. The proposed scheme provides both privacy and authen
APA, Harvard, Vancouver, ISO, and other styles
23

Gudodagi, Raveendra, and R. Venkata Siva Reddy. "Security Provisioning and Compression of Diverse Genomic Data based on Advanced Encryption Standard (AES) Algorithm." International Journal of Biology and Biomedical Engineering 15 (May 14, 2021): 104–12. http://dx.doi.org/10.46300/91011.2021.15.14.

Full text
Abstract:
Compression of genomic data has gained enormous momentum in recent years because of advances in technology, exponentially growing health concerns, and government funding for research. Such advances have driven us to personalize public health and medical care. These pose a considerable challenge for ubiquitous computing in data storage. One of the main issues faced by genomic laboratories is the 'cost of storage' due to the large data file of the human genome (ranging from 30 GB to 200 GB). Data preservation is a set of actions meant to protect data from unauthorized access or changes. There ar
APA, Harvard, Vancouver, ISO, and other styles
24

Iwata, Tetsu, and Yannick Seurin. "Reconsidering the Security Bound of AES-GCM-SIV." IACR Transactions on Symmetric Cryptology, December 15, 2017, 240–67. http://dx.doi.org/10.46586/tosc.v2017.i4.240-267.

Full text
Abstract:
We make a number of remarks about the AES-GCM-SIV nonce-misuse resistant authenticated encryption scheme currently considered for standardization by the Crypto Forum Research Group (CFRG). First, we point out that the security analysis proposed in the ePrint report 2017/168 is incorrect, leading to overly optimistic security claims. We correct the bound and re-assess the security guarantees offered by the scheme for various parameters. Second, we suggest a simple modification to the key derivation function which would improve the security of the scheme with virtually no efficiency penalty.
APA, Harvard, Vancouver, ISO, and other styles
25

"Data Privacy Preservation using AES-GCM Encryption in Heroku Cloud." International Journal of Recent Technology and Engineering 8, no. 3 (2019): 7544–48. http://dx.doi.org/10.35940/ijrte.c6131.098319.

Full text
Abstract:
The increasing popularity of cloud data storage and its ever-rising versatility, shows that cloud computing is one of the most widely excepted phenomena. It not only helps with powerful computing facilities but also reduce a huge amount of computational cost. And with such high demand for storage has raised the growth of the cloud service industry that provides an affordable, easy-to-use and remotely-accessible services. But like every other emerging technology it carries some inherent security risks associated and cloud storage is no exception. The prime reason behind it is that users have to
APA, Harvard, Vancouver, ISO, and other styles
26

Mennink, Bart, and Samuel Neves. "Optimal PRFs from Blockcipher Designs." IACR Transactions on Symmetric Cryptology, September 19, 2017, 228–52. http://dx.doi.org/10.46586/tosc.v2017.i3.228-252.

Full text
Abstract:
Cryptographic modes built on top of a blockcipher usually rely on the assumption that this primitive behaves like a pseudorandom permutation (PRP). For many of these modes, including counter mode and GCM, stronger security guarantees could be derived if they were based on a PRF design. We propose a heuristic method of transforming a dedicated blockcipher design into a dedicated PRF design. Intuitively, the method consists of evaluating the blockcipher once, with one or more intermediate state values fed-forward. It shows strong resemblance with the optimally secure EDMD construction by Mennink
APA, Harvard, Vancouver, ISO, and other styles
27

Marshall, Ben, G. Richard Newell, Dan Page, Markku-Juhani O. Saarinen, and Claire Wolf. "The design of scalar AES Instruction Set Extensions for RISC-V." IACR Transactions on Cryptographic Hardware and Embedded Systems, December 3, 2020, 109–36. http://dx.doi.org/10.46586/tches.v2021.i1.109-136.

Full text
Abstract:
Secure, efficient execution of AES is an essential requirement on most computing platforms. Dedicated Instruction Set Extensions (ISEs) are often included for this purpose. RISC-V is a (relatively) new ISA that lacks such a standardized ISE. We survey the state-of-the-art industrial and academic ISEs for AES, implement and evaluate five different ISEs, one of which is novel. We recommend separate ISEs for 32 and 64-bit base architectures, with measured performance improvements for an AES-128 block encryption of 4x and 10x with a hardware cost of 1.1K and 8.2K gates respectively, when compared
APA, Harvard, Vancouver, ISO, and other styles
28

"Implementation of AES-GCM encryption algorithm for high performance and low power architecture Using FPGA." International Journal of Research and Applications 1, no. 3 (2014): 120–31. http://dx.doi.org/10.17812/ijra.1.3(26)2014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Sakamoto, Kosei, Fukang Liu, Yuto Nakano, Shinsaku Kiyomoto, and Takanori Isobe. "Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G." IACR Transactions on Symmetric Cryptology, June 11, 2021, 1–30. http://dx.doi.org/10.46586/tosc.v2021.i2.1-30.

Full text
Abstract:
In this paper, we present an AES-based authenticated-encryption with associated-data scheme called Rocca, with the purpose to reach the requirements on the speed and security in 6G systems. To achieve ultra-fast software implementations, the basic design strategy is to take full advantage of the AES-NI and SIMD instructions as that of the AEGIS family and Tiaoxin-346. Although Jean and Nikolić have generalized the way to construct efficient round functions using only one round of AES (aesenc) and 128-bit XOR operation and have found several efficient candidates, there still seems to exist pote
APA, Harvard, Vancouver, ISO, and other styles
30

Nawal, Aishwarya, Harish Soni, Shweta Arewar, and Varshita Gangadhara. "Secure File Storage On Cloud Using Hybrid Cryptography." International Journal of Advanced Research in Science, Communication and Technology, May 6, 2021, 79–83. http://dx.doi.org/10.48175/ijarsct-1101.

Full text
Abstract:
The servers that are accessed over the web and the software and databases that run on those servers are together known as "The Cloud". The amount of data needing storage is increasing every day and thus, there is a requirement for increased storage space. Cloud allows us to do the same. Storage of data on the cloud is done for various companies, colleges, for military purposes, etc. The data on the cloud is susceptible to various risks such as lack of backup services, data leakage, lack of control over your data being stored, etc. To provide a solution to these risks over cloud storage there a
APA, Harvard, Vancouver, ISO, and other styles
31

Bhattacharya, Srimanta, and Mridul Nandi. "Revisiting Variable Output Length XOR Pseudorandom Function." IACR Transactions on Symmetric Cryptology, March 1, 2018, 314–35. http://dx.doi.org/10.46586/tosc.v2018.i1.314-335.

Full text
Abstract:
Let σ be some positive integer and C ⊆ {(i, j) : 1 ≤ i < j ≤ σ}. The theory behind finding a lower bound on the number of distinct blocks P1, . . . , Pσ ∈ {0, 1}n satisfying a set of linear equations {Pi ⊕Pj = ci,j : (i, j) ∈ C} for some ci,j ∈ {0, 1}n, is called mirror theory. Patarin introduced the mirror theory and provided a proof for this. However, the proof, even for a special class of equations, is complex and contains several non-trivial gaps. As an application of mirror theory, XORP[w] (known as XOR construction) returning (w−1) block output, is a pseudorandom function (PRF) for so
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!