Improved Cyber Security by Hardware Acceleration of Scalable Encryption Algorithm in OpenSSL
Mohamed Khalil-Hani, Vishnu P., Nambiar M., Marsono N., “Hardware Acceleration of OpenSSL cryptographic functionsfor high-performance Internet Security”International Conference on Intelligent Systems, Modelling and Simulation, 2010.
Nambiar V. P., Khalil-Hani M., and Zabidi M. M, “Accelerating the AES encryption function in OpenSSL for embedded systems,” International Journal of Information and Communication Technology, IJCTS 2009, vol. 2, no. 1/2, pp. 83–93.
Khalil-Hani M., Nazrin M., and Hau Y. W., “Implementation of SHA-2 hash function for a digital signature System-on- Chip in FPGA,” in International Conference on Electronic Design, ICED 2000.
Praveen Kumar B., Ezhumalai P., Ramesh P., Dr SankaraGomathi S., Dr.Sakthivel P., “Improving the Performance of a Scalable Encryption Algorithm (SEA) using FPGA”, IJCSNS International Journal of Computer Science and Network Security, Febraury 2010, VOL. 10 No.2.
Maharak C. and Sowanwanichakul B., “Security methods for Web- based applications on embedded system,” 2004 IEEE Region 10 Conference, vol. C, 2004, pp.56–59 Vol. 3.
Colleen E. Garcia, Naval Postgraduate School, Monterey, California, “Regulating nation-state cyber attacks in Counter terrorism operations” – Master Thesis, June 2010.
EkawatHomsirikamol, MarcinRogawski, Kris Gaj, in George Mason University, “Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs” – Master Thesis, 2010.
Jury:Prof. Y.Willems, voorzitter in Katholiekeuniversiteitleuven Kasteelpark, Arenberg 10, B–3001 Heverlee, “Analysis and design of symmetric encryption algorithms” - Master Thesis, May 2007 .
Pravir Chandra, Matt Messier, John Viega, Publisher : O'ReillyPub Date : ISBN : 0-596-00270. Network Security with OpenSSL, June 2002.
Pascal junod, in EcolePolytechnique, Federale De Lausanne, “Statistical Cryptanalysis of Block Ciphers” – Master Thesis, 2005.
Stephen A. Weis in Massachusett Institute of Technology, “New Foundations for Efficient Authentication, Commutative Cryptography, and Private DisjointnessTestinG”, May 2006.
Saar Drimer in University of Cambridge United Kingdom, “Security for volatile FPGAs” – Master Thesis, November 2009.
Wollinger .T, J. Guajardo, C. Paar, “Cryptography in Embedded Systems: An Overview,” in Proc. of the Embedded World 2003 Exhibition and Conference.
William Stallings 3’rd Edition, Publisher: Pearson Education. “Cryptography and Network Security – Principles and Practices”, June 2003.
“Hacking Techniques – High Tech Crime Brief” An Article by Australian Institute of Criminology, 2005.
“2010 Data Breach Investigations Report”, A study conducted by the Verizon Business RISK team in cooperation with the United States Secret Service.
www.openssl.org/documents/ssl-tls.php and www.cryptography.org.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.