Encryption System

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 32457 Experts worldwide ranked by ideXlab platform

James Irvine - One of the best experts on this subject based on the ideXlab platform.

  • FPL - Using System Generator to Design a Reconfigurable Video Encryption System
    Field Programmable Logic and Application, 2003
    Co-Authors: Daniel Denning, Neil Harold, Malachy Devlin, James Irvine
    Abstract:

    In this paper, we discuss the use of System Generator to design a reconfigurable video Encryption System. It includes the design of the AES (Advanced Encryption System) and Enigma Encryption cores. As a result of using this design flow, we are able to efficiently implement our System and algorithms with a significant improvement on traditional design times, without compromise for performance.

  • Using System Generator to design a reconfigurable video Encryption System
    Lecture Notes in Computer Science, 2003
    Co-Authors: Daniel Denning, Neil Harold, Malachy Devlin, James Irvine
    Abstract:

    In this paper, we discuss the use of System Generator to design a reconfigurable video Encryption System. It includes the design of the AES (Advanced Encryption System) and Enigma Encryption cores. As a result of using this design flow, we are able to efficiently implement our System and algorithms with a significant improvement on traditional design times, without compromise for performance.

Daniel Denning - One of the best experts on this subject based on the ideXlab platform.

  • FPL - Using System Generator to Design a Reconfigurable Video Encryption System
    Field Programmable Logic and Application, 2003
    Co-Authors: Daniel Denning, Neil Harold, Malachy Devlin, James Irvine
    Abstract:

    In this paper, we discuss the use of System Generator to design a reconfigurable video Encryption System. It includes the design of the AES (Advanced Encryption System) and Enigma Encryption cores. As a result of using this design flow, we are able to efficiently implement our System and algorithms with a significant improvement on traditional design times, without compromise for performance.

  • Using System Generator to design a reconfigurable video Encryption System
    Lecture Notes in Computer Science, 2003
    Co-Authors: Daniel Denning, Neil Harold, Malachy Devlin, James Irvine
    Abstract:

    In this paper, we discuss the use of System Generator to design a reconfigurable video Encryption System. It includes the design of the AES (Advanced Encryption System) and Enigma Encryption cores. As a result of using this design flow, we are able to efficiently implement our System and algorithms with a significant improvement on traditional design times, without compromise for performance.

Malachy Devlin - One of the best experts on this subject based on the ideXlab platform.

  • FPL - Using System Generator to Design a Reconfigurable Video Encryption System
    Field Programmable Logic and Application, 2003
    Co-Authors: Daniel Denning, Neil Harold, Malachy Devlin, James Irvine
    Abstract:

    In this paper, we discuss the use of System Generator to design a reconfigurable video Encryption System. It includes the design of the AES (Advanced Encryption System) and Enigma Encryption cores. As a result of using this design flow, we are able to efficiently implement our System and algorithms with a significant improvement on traditional design times, without compromise for performance.

  • Using System Generator to design a reconfigurable video Encryption System
    Lecture Notes in Computer Science, 2003
    Co-Authors: Daniel Denning, Neil Harold, Malachy Devlin, James Irvine
    Abstract:

    In this paper, we discuss the use of System Generator to design a reconfigurable video Encryption System. It includes the design of the AES (Advanced Encryption System) and Enigma Encryption cores. As a result of using this design flow, we are able to efficiently implement our System and algorithms with a significant improvement on traditional design times, without compromise for performance.

Neil Harold - One of the best experts on this subject based on the ideXlab platform.

  • FPL - Using System Generator to Design a Reconfigurable Video Encryption System
    Field Programmable Logic and Application, 2003
    Co-Authors: Daniel Denning, Neil Harold, Malachy Devlin, James Irvine
    Abstract:

    In this paper, we discuss the use of System Generator to design a reconfigurable video Encryption System. It includes the design of the AES (Advanced Encryption System) and Enigma Encryption cores. As a result of using this design flow, we are able to efficiently implement our System and algorithms with a significant improvement on traditional design times, without compromise for performance.

  • Using System Generator to design a reconfigurable video Encryption System
    Lecture Notes in Computer Science, 2003
    Co-Authors: Daniel Denning, Neil Harold, Malachy Devlin, James Irvine
    Abstract:

    In this paper, we discuss the use of System Generator to design a reconfigurable video Encryption System. It includes the design of the AES (Advanced Encryption System) and Enigma Encryption cores. As a result of using this design flow, we are able to efficiently implement our System and algorithms with a significant improvement on traditional design times, without compromise for performance.

Jung-hui Chiu - One of the best experts on this subject based on the ideXlab platform.

  • An OFDM-Based Speech Encryption System without Residual Intelligibility
    IEICE Transactions on Information and Systems, 2008
    Co-Authors: Der-chang Tseng, Jung-hui Chiu
    Abstract:

    Since an FFT-based speech Encryption System retains a considerable residual intelligibility, such as talk spurts and the original intonation in the encrypted speech, this makes it easy for eavesdroppers to deduce the information contents from the encrypted speech. In this letter, we propose a new technique based on the combination of an orthogonal frequency division multiplexing (OFDM) scheme and an appropriate QAM mapping method to remove the residual intelligibility from the encrypted speech by permuting several frequency components. In addition, the proposed OFDM-based speech Encryption System needs only two FFT operations instead of the four required by the FFT-based speech Encryption System. Simulation results are presented to show the effectiveness of this proposed technique.