TITLE

Energy Efficiency Comparison with Cipher Strength of AES and Rijndael Cryptographic Algorithms in Mobile Devices

PUB. DATE
February 2011
SOURCE
Electronics & Electrical Engineering;2011, Issue 108, p11
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
No abstract available.
ACCESSION #
58658743

 

Related Articles

  • Energy Consumption of Cryptographic Algorithms in Mobile Devices. Toldinas, J.; Damasevicius, R.; Venckauskas, A.; Blazauskas, T.; Ceponis, J. // Electronics & Electrical Engineering;2014, Vol. 20 Issue 5, p158 

    Modern business information technologies, such as Cloud computing and Bring Your Own Device (BYOD) raise new requirements for end node security. Cryptographic algorithms must be used to ensure security of business data and communications. However, data encryption decreases battery lifetime on...

  • A Novel Enhancement Technique of the Hill Cipher for Effective Cryptographic Purposes. Abidin, A.F.A.; O.Y. Chuan; Ariffin, M.R.K. // Journal of Computer Science;2011, Vol. 7 Issue 5, p785 

    Problem statement: The Hill cipher is the first polygraph cipher which has a few advantages in data encryption. However, it is vulnerable to known plaintext attack. Besides, an invertible key matrix is needed for decryption. It may become problematic since an invertible key matrix does not...

  • EE INDUSTRY UPDATE.  // EE: Evaluation Engineering;Apr2013, Vol. 52 Issue 4, p6 

    The article offers news briefs related to the electronic industries. Mobile industry processor interface (MIPI) testing services for mobile device component suppliers have been demonstrated by the University of New Hampshire Interoperability Laboratory (UNH-IOL). The outsourced manufacturing...

  • Research on the Self-Shrinking 2-Adic Cryptographic Generator.  // Journal of Communication & Computer;Nov2010, Vol. 7 Issue 11, p67 

    No abstract available.

  • A COMPREHENSIVE STUDY OF TIME COMPLEXITY OF VARIOUS ENCRYPTION ALGORITHMS. Singh, Vikendra; Dhiman, Harsh; Khatkar, Manisha; Nida // International Journal of Advances in Engineering & Technology;May2014, Vol. 7 Issue 2, p495 

    As the technology is going to increase, security issues are also going to increase. A secure way of communication and transmission is needed in terms encryption system. So, we need a best encryption algorithm which takes less time complexity. Time complexity refers to CPU time taken to encrypt...

  • A SECURE ENCRYPTION LOGIC FOR COMMUNICATION IN WIRELESS SENSOR NETWORKS. Mandal, Shanta; Chaki, Rituparna // International Journal on Cryptography & Information Security;Sep2012, Vol. 2 Issue 3, p107 

    This paper presents an encryption scheme suitable for direct diffusion protocols. We have calculated computational and communication overheads in terms of energy consumption using Directed Diffusion protocol. Public-key cryptography has been observed to suffer from high computational complexity...

  • INCORPORATION OF REDUCED 09, 0B, 0D AND 0E STRUCTURES INTO INVERSE MIX COLUMNS FOR AES-128 TECHNIQUE. KUMAR, M. SENTHIL; RAJALAKSHM, S. // Journal of Theoretical & Applied Information Technology;12/10/2014, Vol. 70 Issue 1, p112 

    Cryptography technique plays a vital role in Signal Processing, Wireless Communication, Satellite Communication, Cellular Mobile Communication and Wi-Max for high security features. AES Encryption is performed to convert plain text into cipher text, and AES Decryption is used to retrieve the...

  • Performance Evaluation of Security-Throughput Tradeoff with Channel Adaptive Encryption. Jindal, Poonam; Singh, Brahmjit // International Journal of Computer Network & Information Security;Jan2013, Vol. 5 Issue 1, p49 

    With the ever increasing volume of information over wireless medium, security has assumed an important dimension. The security of transmitted data over a wireless channel aims at protecting the data from unauthorized intrusion. Wireless network security is achieved using cryptographic...

  • A High Speed Block Cipher Algorithm. Bac Do Thi; Minh Nguyen Hieu // International Journal of Security & Its Applications;Nov2013, Vol. 7 Issue 6, p43 

    The Block cipher BM-128 which is proved to be suitable to the applications in the wireless communication systems are proposed in this paper. It is developed based on SDDO which is constructed from CSPN. BM-128 also eliminates the weak keys without the complex round key proceduce and meet the...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics