Essays about: "aes implementation"

Showing result 16 - 20 of 33 essays containing the words aes implementation.

  1. 16. Electromagnetic analysis of AES-256 on Xilinx Artix-7

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Oskar Westman; [2018]
    Keywords : Electromagnetic side-channel attack; AES-256; Artix-7; FPGA; Differential analysis; Simple analysis.; Technology and Engineering;

    Abstract : In this project, an electromagnetic side-channel attack has been made by exploiting the information leakage from a field programmable gate array (FPGA) and an implemented advanced encryption standard with a 256-bit key (AES-256). The FPGA-board was a Nexys-4 from Digilent with Artix-7 FPGA. The attack was partially successful. READ MORE

  2. 17. Possible solutions to the failure of agri-environmental measures. Could increasing collaboration and knowledge save biodiversity?

    University essay from Lunds universitet/Miljövetenskaplig utbildning

    Author : Julia Weber; [2017]
    Keywords : Agri-environmental measures; agri-environmental schemes; ecological focus areas; farmers preferences; collective participation; Agriculture and Food Sciences;

    Abstract : The common agricultural policy (CAP) has been stated as one of the most important policies within the European Union (EU), and is the fundament for agricultural development in the member states. However, the CAP has been stated to effect biodiversity in a negative way. READ MORE

  3. 18. A Comparison of EncryptionAlgorithms for Protecting data passed Through a URL

    University essay from Linnéuniversitetet/Institutionen för datavetenskap (DV)

    Author : Mohamed Osman; Adam Johansson; [2017]
    Keywords : Encryption; ASP.NET CORE; Security; web application; Query String; AES; DES;

    Abstract : This project starts off with giving an overview of what sensitive data is, encryption algorithms and other required knowledge for this thesis project.This is because of the aim of this thesis project, that is to find the best way to encrypt data passed through a URL with a focus on protecting sensitive data in web applications. READ MORE

  4. 19. Implementation and Evaluation of Espresso Stream Cipher in 65nm CMOS

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Richard Lowenrud; Jacob Kimblad; [2016]
    Keywords : Espresso; AES; IoT; Encryption; Power consumption; Low-power techniques; Espresso; AES; IoT; Kryptering; Energiförbrukning; Strömsparande tekniker;

    Abstract : With the upcoming 5G networks and expected growth of the Internet of Things (IoT), the demand for fast and reliable encryption algorithms will increase. As many systems might be time critical and run on internal power sources, the algorithms must be small, fast, energy efficient and have low latency. READ MORE

  5. 20. Anonymous networks: A theoretical and practical approach

    University essay from Linköpings universitet/Institutionen för datavetenskap; Linköpings universitet/Tekniska fakulteten

    Author : Karl Fredrik Gudjonsson; Alexander Ulander; [2016]
    Keywords : ;

    Abstract : This thesis presents an overview of different solutions for anonymous networks. Theory behind connection- and data-anonymity is described, how to implement them and the theory behind commonly used cryptography. READ MORE