Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "ffd3e135-9e0f-4c42-b2a4-60cfbfd28347"}, "_deposit": {"id": "3908", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3908"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3908", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Advanced Encryption Standard in Counter Mode", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "As the information technology communicationadvances, there is a need for strong interest in the informationsecurity. Encryption is one of the alternative techniques thatcan be applied to any system for safeguarding sensitive data.The National Institute of Standards and Technology (NIST)recently selected the Advanced Encryption Standard (AES) .also known as Rijndael. The AES is a block cipher , and it canbe used in many different modes. AES itself is a very strongcipher, and counter mode makes it difficult for aneaveasdropper to sport patterns. This system implements the useof AES Counter Mode (AES-CTR), with an explicit initializationvector (IV). We will apply Linear Congruential Method (LCM)for IV generation and a decentralized approach for keydistribution. AES-CTR has many properties that make it anattractive encryption algorithm for in high-speed networking."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-08-02"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Advanced Encryption Standard in Counter Mode.pdf", "filesize": [{"value": "10 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 10000.0, "url": {"url": "https://meral.edu.mm/record/3908/files/Advanced Encryption Standard in Counter Mode.pdf"}, "version_id": "1ca9ec00-36c1-4690-86ac-ed44b5a7c5a9"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Third Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Thuya, Sai Kyaw"}, {"subitem_authors_fullname": "Mya, Khin Than"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-08-03"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1629"}, "item_title": "Advanced Encryption Standard in Counter Mode", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003908", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-02"}, "publish_date": "2019-08-02", "publish_status": "0", "recid": "3908", "relation": {}, "relation_version_is_last": true, "title": ["Advanced Encryption Standard in Counter Mode"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Advanced Encryption Standard in Counter Mode

http://hdl.handle.net/20.500.12678/0000003908
http://hdl.handle.net/20.500.12678/0000003908
80ba8c82-da10-4b3a-b4ae-f7e3a511e3a7
ffd3e135-9e0f-4c42-b2a4-60cfbfd28347
None
Preview
Name / File License Actions
Advanced Advanced Encryption Standard in Counter Mode.pdf (10 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:46:14.853600
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL