2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT) 2019
DOI: 10.1109/icccnt45670.2019.8944857
|View full text |Cite
|
Sign up to set email alerts
|

Application of Advanced Encryption Standard on Real Time Secured Voice Communication using FPGA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…The proposed solution by Mondal and Sharma [54] is the only solution that provides high throughput capacity with 15 kHz of 32 bits, or equivalent to 480 kbps and implements standard security algorithm AES-128. Nevertheless, the speech quality assessment was not conducted in this proposed solution.…”
Section: ) Hardware Codecmentioning
confidence: 99%
“…The proposed solution by Mondal and Sharma [54] is the only solution that provides high throughput capacity with 15 kHz of 32 bits, or equivalent to 480 kbps and implements standard security algorithm AES-128. Nevertheless, the speech quality assessment was not conducted in this proposed solution.…”
Section: ) Hardware Codecmentioning
confidence: 99%
“…The protocol implements the negotiation of security parameters through small time windows where participants agree on algorithms and cryptographic settings. During this process, a Short Authentication String (SAS) code is generated and can be used to verify the user's identity (Qi et al, 2018).…”
Section: Zrtp Protocolmentioning
confidence: 99%
“…Qt Creator offers a wide choice of types of projects when developing applications, where there are two main types for applications with a graphical user interface: Qt Widgets and Qt Quick. Other project types are variations of these two types (Mondal & Sharma, 2019).…”
Section: Qt Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…The call of task function adopts the way of CPU polling. Each task is divided into several sub functions or sub phases, each sub function or sub phase corresponds to a state [17,18]. The CPU circularly polls the task in the main program, and determines the processing operation according to the current state.…”
Section: Voice Transmission Encryption Based On 3des-ecc Algorithm Inmentioning
confidence: 99%