Efficient implementation of the AES algorithm for security applications.
Shady Mohamed SolimanBaher MagdyMohamed A. Abd El-GhanyPublished in: SoCC (2016)
Keyphrases
- efficient implementation
- active set
- computational complexity
- dynamic programming
- search space
- detection algorithm
- objective function
- hardware implementation
- expectation maximization
- learning algorithm
- worst case
- probabilistic model
- advanced encryption standard
- intrusion detection
- linear programming
- information security
- nonnegative matrix factorization
- optimal solution
- block matching motion estimation