Learn More
The memory Cache data access time uncertainty and resource multi-process sharing mechanism provide a new covert channel to leak process secret information. The AES software implementation used many table lookup operations to access cache, and these lookup indices have close relationship with the secret key. According to 128-bit AES, we propose a new robust(More)
Security is a basic requirement of an organization in the world to keep their information secure from their competitors. AES is the most recent algorithm which includes encryption with the help of reliable keys. It is used to protect the data including banking, financial, and government information. In this paper we analyzed various parameters of encryption(More)
  • 1