메뉴 건너뛰기




Volumn 1-3, Issue , 2009, Pages 1001-1006

Performance evaluation of symmetric encryption algorithms

Author keywords

3DES; AES; Blowfish; Computer security; DES; Encryption techniques; RC2; RC6

Indexed keywords

ALGORITHMS; KNOWLEDGE MANAGEMENT; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84898052514     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (22)

References (16)
  • 1
    • 0842326338 scopus 로고    scopus 로고
    • Encryption and Power Consumption in Wireless LANs-N
    • The Third IEEE Workshop on Wireless LANs-September 27-28, Newton, Massachusetts
    • Ruangchaijatupon, P. Krishnamurthy, "Encryption and Power Consumption in Wireless LANs-N," The Third IEEE Workshop on Wireless LANs-September 27-28, 2001- Newton, Massachusetts.
    • (2001)
    • Ruangchaijatupon, P.K.1
  • 2
    • 77950966955 scopus 로고    scopus 로고
    • Security In Wireless LANS And MANS
    • Hardjono, Artech House Publishers
    • Hardjono, "Security In Wireless LANS And MANS," Artech House Publishers 2005.
    • (2005)
  • 3
    • 0003902428 scopus 로고    scopus 로고
    • Cryptography and Network Security 4th Ed
    • Prentice Hall
    • W. Stallings, "Cryptography and Network Security 4th Ed," Prentice Hall, 2005, PP. 58-309.
    • (2005) , pp. 58-309
    • Stallings, W.1
  • 4
    • 0028428941 scopus 로고
    • The Data Encryption Standard (DES) and Its Strength Against Attacks
    • May
    • Coppersmith, D. "The Data Encryption Standard (DES) and Its Strength Against Attacks." IBM Journal of Research and Development, May 1994, pp. 243-250.
    • (1994) IBM Journal of Research and Development , pp. 243-250
    • Coppersmith, D.1
  • 5
    • 20444365964 scopus 로고    scopus 로고
    • The Blowfish Encryption Algorithm
    • Retrieved October 25
    • Bruce Schneier. The Blowfish Encryption Algorithm Retrieved October 25, 2008, http://www.schneier.com/blowfish.html
    • (2008)
    • Schneier, B.1
  • 6
    • 0035360456 scopus 로고    scopus 로고
    • Software Implementation Strategies for Power-Conscious Systems
    • K. Naik, D. S.L. Wei, Software Implementation Strategies for Power-Conscious Systems," Mobile Networks and Applications-6, 291-305, 2001.
    • (2001) Mobile Networks and Applications , vol.6 , pp. 291-305
    • Naik, K.1    Wei, D.S.L.2
  • 7
    • 0013017020 scopus 로고    scopus 로고
    • Rijndael: The Advanced Encryption Standard
    • March
    • Daemen, J., and Rijmen, V. "Rijndael: The Advanced Encryption Standard." Dr. Dobb's Journal, March 2001,PP. 137-139.
    • (2001) Dr. Dobb's Journal , pp. 137-139
    • Daemen, J.1    Rijmen, V.2
  • 8
    • 62749096566 scopus 로고    scopus 로고
    • Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms
    • Nov
    • N. El-Fishawy, "Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms", International Journal of Network Security,, Nov. 2007, PP. 241-251
    • (2007) International Journal of Network Security , pp. 241-251
    • El-Fishawy, N.1
  • 9
    • 77953153793 scopus 로고    scopus 로고
    • Trade-offs Between Energy and Security in Wireless Networks Thesis
    • Worcester Polytechnic Institute, April
    • K. McKay, "Trade-offs Between Energy and Security in Wireless Networks Thesis," Worcester Polytechnic Institute, April 2005.
    • (2005)
    • McKay, K.1
  • 10
    • 84898020796 scopus 로고    scopus 로고
    • Battery power-aware encryption-ACM Transactions on Information and System Security (TISSEC)
    • May
    • R. Chandramouli, "Battery power-aware encryption-ACM Transactions on Information and System Security (TISSEC)," Volume 9, Issue 2, May. 2006.
    • (2006) , vol.9 , Issue.2
    • Chandramouli, R.1
  • 11
    • 4544219570 scopus 로고    scopus 로고
    • Energy Consumption of Encryption Schemes in Wireless Devices Thesis
    • university of Pittsburgh, April 9, Retrieved October 1, 2008, at
    • S.Hirani, "Energy Consumption of Encryption Schemes in Wireless Devices Thesis," university of Pittsburgh, April 9, 2003. Retrieved October 1, 2008, at: portal.acm.org/citation.cfm?id=383768
    • (2003)
    • Hirani, S.1
  • 12
    • 33847314186 scopus 로고    scopus 로고
    • A Performance Comparison of Data Encryption Algorithms
    • IEEE [Information and Communication Technologies, 2005. ICICT, First International Conference, 2006-02-27
    • "A Performance Comparison of Data Encryption Algorithms," IEEE [Information and Communication Technologies, 2005. ICICT 2005. First International Conference, 2006-02-27, PP. 84-89.
    • (2005) , pp. 84-89
  • 13
    • 84898053425 scopus 로고    scopus 로고
    • Results of comparing tens of encryption algorithms using different settings- Crypto++ benchmark Retrieved October 1, from
    • Results of comparing tens of encryption algorithms using different settings- Crypto++ benchmark Retrieved October 1, 2008, from:http://www.eskimo.com/~weidai/benchmarks.html
    • (2008)
  • 15
    • 80053202563 scopus 로고    scopus 로고
    • Performance Analysis of Data Encryption Algorithms
    • Retrieved October 1
    • A.A. Tamimi, "Performance Analysis of Data Encryption Algorithms. Retrieved October 1, 2008 from http://www.cs.wustl.edu/~jain/cse567-06/ftp/encryption_perf/index.html
    • (2008)
    • Tamimi, A.A.1
  • 16
    • 0034841273 scopus 로고    scopus 로고
    • A Web Based Tool for Software Energy Profiling
    • proceedings of the 38th Design, NV, as Vegas, DAC,Conference. utomation, USp
    • A. Sinha and A.P. Chandrakasan, Joule Track, "A Web Based Tool for Software Energy Profiling,," proceedings of the 38th Design, NV, as Vegas,2001 DAC,Conference. utomation, USp.p 220-225
    • (2001) , pp. 220-225
    • Sinha, A.1    Chandrakasan, A.P.2    Track, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.