Hybrid encryption algorithm based on symmetric and asymmetric ciphers
In trusted computing architecture, security is one of crucial aspects to protect the design against hardware or software attacks. The symmetric encryption method works great for fast encryption of large data. Still, it doesn’t provide identity verification. Meanwhile, the asymmetric encryption metho...
Saved in:
Main Author: | Mohd. Zulkimi, Noor Amira Zuraini |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2021
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/99497/1/NoorAmiraZurainiMKE2021.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Analysis and design of stream cipher encryption algorithms
by: Tuan Mat, Tuan Sabri
Published: (1995) -
Design and implementation of lightweight encryption algorithm using prince cipher
by: Lee, Jiah Chun
Published: (2021) -
An embedded cryptosystem implementing symmetric cipher and public-key crypto algorithms in hardware
by: Hau, Yuan Wen
Published: (2005) -
IoT data encryption algorithm for security
by: Kanaan Ismael, Marwan
Published: (2020) -
Hardware-based biometric encryption implementation with Gauss-Jordan algorithm accelerator core in field programmable gate arrays
by: Liew, Tek Yee
Published: (2011)