{"created":"2020-09-01T13:46:13.708947+00:00","id":3908,"links":{},"metadata":{"_buckets":{"deposit":"ffd3e135-9e0f-4c42-b2a4-60cfbfd28347"},"_deposit":{"id":"3908","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3908"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3908","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Advanced Encryption Standard in Counter Mode","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"As the information technology communicationadvances, there is a need for strong interest in the informationsecurity. Encryption is one of the alternative techniques thatcan be applied to any system for safeguarding sensitive data.The National Institute of Standards and Technology (NIST)recently selected the Advanced Encryption Standard (AES) .also known as Rijndael. The AES is a block cipher , and it canbe used in many different modes. AES itself is a very strongcipher, and counter mode makes it difficult for aneaveasdropper to sport patterns. This system implements the useof AES Counter Mode (AES-CTR), with an explicit initializationvector (IV). We will apply Linear Congruential Method (LCM)for IV generation and a decentralized approach for keydistribution. AES-CTR has many properties that make it anattractive encryption algorithm for in high-speed networking."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-08-02"}],"displaytype":"preview","filename":"Advanced Encryption Standard in Counter Mode.pdf","filesize":[{"value":"10 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3908/files/Advanced Encryption Standard in Counter Mode.pdf"},"version_id":"1ca9ec00-36c1-4690-86ac-ed44b5a7c5a9"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Third Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Thuya, Sai Kyaw"},{"subitem_authors_fullname":"Mya, Khin Than"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-08-03"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1629"},"item_title":"Advanced Encryption Standard in Counter Mode","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-08-02","publish_status":"0","recid":"3908","relation_version_is_last":true,"title":["Advanced Encryption Standard in Counter Mode"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T04:33:43.339528+00:00"}