Advanced Encryption Standard

@inproceedings{Miller2009AdvancedES,
  title={Advanced Encryption Standard},
  author={Frederic P. Miller and Agnes F. Vandome and John McBrewster},
  year={2009}
}
In cryptography, the Advanced Encryption Standard (AES) is an encryption standard adopted by the U.S. government. The standard comprises three block ciphers, AES-128, AES-192 and AES-256, adopted from a larger collection originally published as Rijndael. Each AES cipher has a 128-bit block size, with key sizes of 128, 192 and 256 bits, respectively. The AES ciphers have been analyzed extensively and are now used worldwide, as was the case with its predecessor, the Data Encryption Standard (DES… 
Study of the IEEE Standard 1619.1: Authenticated Encryption with Length Expansion for Storage Devices
TLDR
This Thesis will analyze the standard 1619.1 published by the IEEE to provide authenticated encryption to stored data with AES algorithm working in XTS mode, a 128-bit block cipher characterized by the use of two AES encryptions with two different keys of the same size.
A Secure Software Implementation of Nonlinear Advanced Encryption Standard
TLDR
The result shows that the new nonlinear implementation of the AES S-Box by using Verilog provides enhanced security with good enough speed for encryption and decryption.
AES: Current security and efficiency analysis of its alternatives
TLDR
This paper reviews existing attacks on the AES and evaluates the efficiency of recent block cipher proposals as alternatives to the AES to patch the AES against the related-key type of attack.
VLSI IMPLEMENTATION FOR SECURITY PARADIGM OF AES INCLUDING DPA ATTACKS
TLDR
To protect FPGAs from DPA attack, the problem of randomized execution in a loop has been comparatively analysed and a few algorithms to randomize the implementation in aloop has been proposed.
Proposing of Developed Advance Encryption Standard
This paper presents a variant of Advance Encryption Standard (AES) cipher that is depending on the same structure of the original AES Substitution Permutation Network (SPN) and the same mathematical
A Survey on Authenticated Encryption--ASIC Designer’s Perspective
TLDR
This work presents a comprehensive survey of hardware performance of the most commonly used AE schemes in the literature, and reveals 13%--30% performance boost in permutation-based AE compared to conventional schemes, and can be used as a benchmark in the ongoing AE competition CAESAR.
Efficiency of AES finalist candidate algorithms
TLDR
The paper evaluates three AES algorithms which are Rijndael, Serpent, and Twofish and finds that Rij secondael is the best.
Development AES Algorithm to Encryption Images and Sounds Files
TLDR
The implement algorithm with a sample of histogram was used to ensure that the data is not changed throughout this study, by comparing the block size of images or sounds files through the encrypting or decrypting system by scanning bit to bit operations.
FPGA Based Implementation of AES Encryption and Decryption with Verilog HDL
TLDR
A unique feature of the proposed pipelined design is that the round keys, which are consumed during different iterations of encryption, are generated in parallel with the encryption process, which lowers the delay associated with each round of encryption and reduces the overall encryption delay of a plaintext block.
Enhanced Security of Rijndael Algorithm using Two Secret Keys
TLDR
There is an attempt to Enhance the security of rijndael algorithm by adding another key in both encryption and decryption operations to increase the strength of security and keep the performance close to traditional algorithm as much as possible.
...
...