Processing Analysis of Confidential Modes of Operation
暂无分享,去创建一个
[1] Mohey M. Hadhoud,et al. Evaluating The Performance of Symmetric Encryption Algorithms , 2010, Int. J. Netw. Secur..
[2] Siddalingesh S. Navalgund,et al. Parallelization of AES algorithm for disk encryption using CBC and ICBC modes , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[3] Rahul Hans,et al. A Review and Comparative Analysis of Various Encryption Algorithms , 2015 .
[4] Mohamed Mostafa Abdel-Azim,et al. Counter Chain: A New Block Cipher Mode of Operation , 2015, J. Inf. Process. Syst..
[5] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .
[6] David A. Wagner,et al. Tweakable Block Ciphers , 2002, Journal of Cryptology.
[7] Phillip Rogaway,et al. Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC , 2004, ASIACRYPT.
[8] Sultan Almuhammadi,et al. A comparative analysis of AES common modes of operation , 2017, 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE).
[9] Xinxin Mei,et al. Implementation and Analysis of AES Encryption on GPU , 2012, 2012 IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems.
[10] A. Suruliandi,et al. Performance analysis of encryption algorithms for Information Security , 2013, 2013 International Conference on Circuits, Power and Computing Technologies (ICCPCT).
[11] Erke Aribas,et al. Comparative Analysis of Block Cipher Modes of Operation , 2017 .
[12] Nagesh Kumar,et al. DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis , 2011 .
[13] Morris J. Dworkin. SP 800-38E. Recommendation for Block Cipher Modes of Operation: the XTS-AES Mode for Confidentiality on Storage Devices , 2010 .