International Conference on Information Communication and Embedded Systems (ICICES2014) 2014
DOI: 10.1109/icices.2014.7033928
|View full text |Cite
|
Sign up to set email alerts
|

Modified AES based algorithm for MPEG video encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 26 publications
(9 citation statements)
references
References 4 publications
0
8
0
1
Order By: Relevance
“…In the encryption process, each round of the AES encryption loop consists of four steps, which are: Addroundkey transform, SubBytes transform, ShiftRows transform, and mixed column transform [26]. Before looping through the four steps, we initialize the Addroundkey.…”
Section: Advanced Encryption Standardmentioning
confidence: 99%
“…In the encryption process, each round of the AES encryption loop consists of four steps, which are: Addroundkey transform, SubBytes transform, ShiftRows transform, and mixed column transform [26]. Before looping through the four steps, we initialize the Addroundkey.…”
Section: Advanced Encryption Standardmentioning
confidence: 99%
“…In [4] and [5], following evaluation on video encryption, the AES was reportedly the fastest of these standard encryption algorithms. Furthermore, according to some studies, including [6], the AES reduces the computational complexity to an extent. However, the overall improvement is marginal because the overall complexity of the AES is determined by the size of the input data.…”
Section: A Naïve Encryption Algorithmmentioning
confidence: 99%
“…The main advantage of FPGAs is concurrent processing, where all the hardware modules work concurrently. This enables any number of modules implemented on FPGA to run simultaneously [14].…”
Section: Field Programmable Gate Arrays (Fpga)mentioning
confidence: 99%