Login / Signup
FPGA implementation and comparison of AES-GCM and Deoxys authenticated encryption schemes.
Sandhya Koteshwara
Amitabh Das
Keshab K. Parhi
Published in:
ISCAS (2017)
Keyphrases
</>
fpga implementation
encryption scheme
secret key
authentication scheme
hardware implementation
standard model
key distribution
public key
encryption algorithm
databases
ciphertext
lossless compression
hash functions
efficient implementation
image processing
real time
forward secure
cca secure