2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT) 2012
DOI: 10.1109/acsat.2012.44
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Crypto Hardware Utilizing Symmetric-Key and Public-Key Cryptosystems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 27 publications
(12 citation statements)
references
References 16 publications
0
12
0
Order By: Relevance
“…The wide range of cryptographic algorithms started to publicize for decades by DES (Data Encryption Standard) then standardized, after 2000, as AES (Advanced Encryption Standard) [12]. AES (Advanced Encryption Standard) is a symmetric-key algorithm [12]. Initially, when the algorithms first started to appear, it was known as the Rijndael algorithm.…”
Section: Aes (Advanced Encryption Standard)mentioning
confidence: 99%
“…The wide range of cryptographic algorithms started to publicize for decades by DES (Data Encryption Standard) then standardized, after 2000, as AES (Advanced Encryption Standard) [12]. AES (Advanced Encryption Standard) is a symmetric-key algorithm [12]. Initially, when the algorithms first started to appear, it was known as the Rijndael algorithm.…”
Section: Aes (Advanced Encryption Standard)mentioning
confidence: 99%
“…On the other hand, the public key algorithm uses a pair of keys (public key and private key) to perform data encryption and decryption. The advantage of the public key cryptosystem is that providing public keys is easier than distributing secret keys securely [2]. However, the execution of public key algorithms is much slower than the execution of symmetric key algorithms.…”
Section: Trang 201mentioning
confidence: 99%
“…In literature [15], chaotic sequences are used to construct the encryption matrix, but the encryption method is relatively simple. Other research [16] suggests constructing the Hill encryption matrix by an elliptic curve, but the algorithm is too complex.…”
Section: Introductionmentioning
confidence: 99%