-
1
-
-
84858823641
-
Image security and biometrics: A review
-
Emilio Corchado, Vlav Snl, Ajith Abraham, Micha Woniak, and Manuel Gra (Eds.), Vol. Part II. Springer-Verlag, Berlin, Heidelberg
-
Ion Marqu and Manuel Gra. 2012. Image security and biometrics: a review. In Proceedings of the 7th international conference on Hybrid Artificial Intelligent Systems-Volume Part II (HAIS'12), Emilio Corchado, Vlav Snl, Ajith Abraham, Micha Woniak, and Manuel Gra (Eds.), Vol. Part II. Springer-Verlag, Berlin, Heidelberg, 436-447. DOI=10.1007/978-3-642-28931-6-42 http://dx.doi.org/10.1007/978-3-642-28931-6-42
-
(2012)
Proceedings of the 7th International Conference on Hybrid Artificial Intelligent Systems-Volume Part II (HAIS'12)
, pp. 436-447
-
-
Marqu, I.1
Gra, M.2
-
2
-
-
84934281237
-
-
Technical Report. NIST, Gaithersburg, MD, United States
-
Charles L. Wilson, Patrick J. Grother, and Ramaswamy Chandramouli. 2007. SP 800-76-1. Biometric Data Specification for Personal Identity Verification. Technical Report. NIST, Gaithersburg, MD, United States
-
(2007)
SP 800-76-1. Biometric Data Specification for Personal Identity Verification
-
-
Charles, L.1
Grother, W.P.J.2
Chandramouli, R.3
-
3
-
-
84904722322
-
A hybrid encryption technique for securing biometric image data based on feistel network and RGB pixel displacement
-
Springer Berlin Heidelberg
-
Kester, Q. A., Nana, L., Pascu, A. C., Gire, S., Eghan, J. M., &Quaynnor, N. N. (2014). A hybrid encryption technique for securing biometric image data based on feistel network and RGB pixel displacement. In Recent Trends in Computer Networks and Distributed Systems Security (pp. 530-539). Springer Berlin Heidelberg
-
(2014)
Recent Trends in Computer Networks and Distributed Systems Security
, pp. 530-539
-
-
Kester, Q.A.1
Nana, L.2
Pascu, A.C.3
Gire, S.4
Eghan, J.M.5
Quaynnor, N.N.6
-
4
-
-
84904689185
-
Securing biometric data with visual cryptography and Steganography
-
Springer Berlin Heidelberg
-
Aeloor, Deepak, and Amrita A. Manjrekar. "Securing Biometric Data with Visual Cryptography and Steganography." Security in Computing and Communications. Springer Berlin Heidelberg, 2013. 330-340
-
(2013)
Security in Computing and Communications
, pp. 330-340
-
-
Deepak, A.1
Manjrekar, A.A.2
-
5
-
-
0037542969
-
-
Federal Information Processing Standards Publication 197. United States National Institute of Standards and Technology (NIST November 26
-
"Announcing the ADVANCED ENCRYPTION STANDARD (AES)". Federal Information Processing Standards Publication 197. United States National Institute of Standards and Technology (NIST). November 26, 2001
-
(2001)
Announcing the ADVANCED ENCRYPTION STANDARD (AES)
-
-
-
7
-
-
84857469950
-
On the security of inclusion or omission of MixColumns in AES cipher
-
Dec
-
AlMarashda, K.; AlSalami, Y.; Salah, K.; Martin, T., "On the security of inclusion or omission of MixColumns in AES cipher, " Internet Technology and Secured Transactions (ICITST), 2011 International Conference for , vol. , no. , pp. 34, 39, 11-14 Dec. 2011
-
(2011)
Internet Technology and Secured Transactions (ICITST), 2011 International Conference for
, vol.34
, Issue.39
, pp. 11-14
-
-
Almarashda, K.1
Alsalami, Y.2
Salah, K.3
Martin, T.4
-
8
-
-
77958112921
-
Differential fault analysis against aes-192 and aes-256 with Minimal Faults
-
Aug
-
Chong Hee Kim, "Differential Fault Analysis against AES-192 and AES-256 with Minimal Faults, " Fault Diagnosis and Tolerance in Cryptography (FDTC), 2010 Workshop on , vol. , no. , pp. 3, 9, 21-21 Aug. 2010doi: 10.1109/FDTC.2010.10
-
(2010)
Fault Diagnosis and Tolerance in Cryptography (FDTC), 2010 Workshop on
, vol.3
, Issue.9
, pp. 21-21
-
-
Hee Kim, C.1
-
9
-
-
83455187945
-
From aes-128 to aes-192 and aes-256, how to adapt Differential Fault Analysis Attacks on Key Expansion
-
Sept
-
Floissac, N.; L'Hyver, Y., "From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks on Key Expansion, " Fault Diagnosis and Tolerance in Cryptography (FDTC), 2011 Workshop on , vol. , no. , pp. 43, 53, 28-28 Sept. 2011doi: 10.1109/FDTC.2011.15
-
(2011)
Fault Diagnosis and Tolerance in Cryptography (FDTC), 2011 Workshop on
, vol.43
, Issue.53
, pp. 28-28
-
-
Floissac, N.1
L'Hyver, Y.2
-
10
-
-
83455166352
-
A differential fault analysis on aes key schedule using single Fault
-
Sept
-
Ali, S.S.; Mukhopadhyay, D., "A Differential Fault Analysis on AES Key Schedule Using Single Fault, " Fault Diagnosis and Tolerance in Cryptography (FDTC), 2011 Workshop on , vol. , no. , pp. 35, 42, 28-28 Sept. 2011doi: 10.1109/FDTC.2011.10
-
(2011)
Fault Diagnosis and Tolerance in Cryptography (FDTC), 2011 Workshop on
, vol.35
, Issue.42
, pp. 28-28
-
-
Ali, S.S.1
Mukhopadhyay, D.2
-
11
-
-
79956299075
-
Meet-in-Themiddle attack on 8 rounds of the AES block cipher under 192 key bits
-
Feng Bao and Jian Weng (Eds.). Springer-Verlag, Berlin, Heidelberg
-
Yongzhuang Wei, Jiqiang Lu, and Yupu Hu. 2011. Meet-in-Themiddle attack on 8 rounds of the AES block cipher under 192 key bits. In Proceedings of the 7th international conference on Information security practice and experience (ISPEC'11), Feng Bao and Jian Weng (Eds.). Springer-Verlag, Berlin, Heidelberg, 222-232
-
(2011)
Proceedings of the 7th International Conference on Information Security Practice and Experience (ISPEC'11)
, pp. 222-232
-
-
Wei, Y.1
Lu, J.2
Hu, Y.3
-
12
-
-
12444346059
-
A collision attack on 7 rounds of rijndael
-
New York, USA
-
H. Gilbert, M. Minier, A collision attack on 7 rounds of Rijndael, in Proceedings of the Third AES Candidate Conference (AES3), New York, USA (2000), pp. 230-241
-
(2000)
Proceedings of the Third AES Candidate Conference (AES3)
, pp. 230-241
-
-
Gilbert, H.1
Minier, M.2
-
13
-
-
18844374511
-
AES and the cryptonite crypto processor
-
ACM, New York, NY, USA
-
Dino Oliva, Rainer Buchty, and Nevin Heintze. 2003. AES and the cryptonite crypto processor. In Proceedings of the 2003 international conference on Compilers, architecture and synthesis for embedded systems (CASES '03). ACM, New York, NY, USA, 198-209. DOI=10.1145/951710.951738
-
(2003)
Proceedings of the 2003 International Conference on Compilers, Architecture and Synthesis for Embedded Systems (CASES '03
, pp. 198-209
-
-
Oliva, D.1
Buchty, R.2
Heintze, N.3
-
14
-
-
34249710720
-
Projective aspects of the AES inversion
-
June
-
Wen-Ai Jackson and S. Murphy. 2007. Projective aspects of the AES inversion. Des. Codes Cryptography 43, 2-3 (June 2007), 167-179. DOI=10.1007/s10623-007-9059-4
-
(2007)
Des. Codes Cryptography
, vol.43
, Issue.2-3
, pp. 167-179
-
-
Jackson, W.1
Murphy, S.2
-
15
-
-
33745588540
-
Proving the security of AES substitution-permutation network
-
Bart Preneel and Stafford Tavares (Eds.). Springer-Verlag, Berlin, Heidelberg
-
Thomas Baignes and Serge Vaudenay. 2005. Proving the security of AES substitution-permutation network. In Proceedings of the 12th international conference on Selected Areas in Cryptography (SAC'05), Bart Preneel and Stafford Tavares (Eds.). Springer-Verlag, Berlin, Heidelberg, 65-81. DOI=10.1007/11693383-5
-
(2005)
Proceedings of the 12th International Conference on Selected Areas in Cryptography (SAC'05)
, pp. 65-81
-
-
Baignes, T.1
Vaudenay, S.2
-
16
-
-
64849108004
-
An 8-bit systolic AES architecture for moderate data rate applications
-
May 2009
-
Sheikh Muhammad Farhan, Shoab A. Khan, and Habibullah Jamal. 2009. An 8-bit systolic AES architecture for moderate data rate applications. Microprocess. Microsyst. 33, 3 (May 2009), 221-231. DOI=10.1016/j.micpro.2009.02.013
-
(2009)
Microprocess. Microsyst
, vol.33
, Issue.3
, pp. 221-231
-
-
Muhammad Farhan, S.1
Khan, S.A.2
Jamal, H.3
-
17
-
-
77950297814
-
Single-And multi-core configurable aes architectures for Flexible Security
-
April
-
Mao-Yin Wang; Chih-Pin Su; Chia-Lung Horng; Cheng-Wen Wu; Chih-Tsun Huang, "Single-And Multi-core Configurable AES Architectures for Flexible Security, " Very Large Scale Integration (VLSI) Systems, IEEE Transactions on , vol. 18, no. 4, pp. 541, 552, April 2010doi: 10.1109/TVLSI.2009.2013231
-
(2010)
Very Large Scale Integration (VLSI) Systems IEEE Transactions on
, vol.18
, Issue.4
, pp. 541-552
-
-
Wang, M.1
Su, C.2
Horng, C.3
Wu, C.4
Huang, C.5
-
18
-
-
66149101528
-
Security enhancement of digital motion image transmission using hybrid AESDES algorithm
-
Oct
-
Vishnu, M. B.; Tiong, S.K.; Zaini, M.; Koh, S. P., "Security enhancement of digital motion image transmission using hybrid AESDES algorithm, " Communications, 2008. APCC 2008. 14th Asia-Pacific Conference on , vol. , no. , pp. 1, 5, 14-16 Oct. 2008
-
(2008)
Communications 2008. APCC 2008. 14th Asia-Pacific Conference on
, vol.1
, Issue.5
, pp. 14-16
-
-
Vishnu, M.B.1
Tiong, S.K.2
Zaini, M.3
Koh, S.P.4
-
19
-
-
84876521585
-
FPGA Implementation of High Speed VLSI Architectures for AES Algorithm
-
Nov
-
Kshirsagar, R.V.; Vyawahare, M.V., "FPGA Implementation of High Speed VLSI Architectures for AES Algorithm, " Emerging Trends in Engineering and Technology (ICETET), 2012 Fifth International Conference on , vol. , no. , pp. 239, 242, 5-7 Nov. 2012doi: 10.1109/ICETET.2012.53
-
(2012)
Emerging Trends in Engineering and Technology (ICETET), 2012 Fifth International Conference on
, vol.239
, Issue.242
, pp. 5-7
-
-
Kshirsagar, R.V.1
Vyawahare, M.V.2
-
20
-
-
84863111662
-
A secure software implementation of nonlinear AES S-box with the enhancement of biometrics
-
March
-
Ganesh, E.S.; Velayutham, R.; Manimegalai, D., "A secure software implementation of nonlinear AES S-box with the enhancement of biometrics, " Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on , vol. , no. , pp. 927, 932, 21-22 March 2012doi: 10.1109/ICCEET.2012.6203796
-
(2012)
Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on
, vol.927
, Issue.932
, pp. 21-22
-
-
Ganesh, E.S.1
Velayutham, R.2
Manimegalai, D.3
-
23
-
-
84899582314
-
A novel cryptographic encryption technique for securing Digital Images in the Cloud Using AES and RGB Pixel Displacement
-
Nov
-
Kester, Q.-A.; Nana, L.; Pascu, A.C., "A Novel Cryptographic Encryption Technique for Securing Digital Images in the Cloud Using AES and RGB Pixel Displacement, " Modelling Symposium (EMS), 2013 European , vol. , no. , pp. 293, 298, 20-22 Nov. 2013 doi: 10.1109/EMS.2013.51
-
(2013)
Modelling Symposium (EMS), 2013 European
, vol.293
, Issue.298
, pp. 20-22
-
-
Kester, Q.-A.1
Nana, L.2
Pascu, A.C.3
-
24
-
-
33646500392
-
The Rijndael algorithm
-
April-May
-
Jamil, T., "The Rijndael algorithm, " Potentials, IEEE , vol. 23, no. 2, pp. 36, 38, April-May 2004 doi: 10.1109/MP.2004.1289996
-
(2004)
Potentials IEEE
, vol.23
, Issue.2
, pp. 36-38
-
-
Jamil, T.1
|