Cryptography plays a vital role in data security against the attacks from the third party. In this thesis, the focus is to leverage existing, commonly used cryptography algorithm which is the Advanced Encryption Standard (AES) and improve its speed performance. The motivation is to make encryption process as short as possible to aid in increasing a system's ability to process large amount of data. FPGA is chosen as the platform due to it does not have software overhead and is meant to be customized for real time applications. Most of the researches are done on the area of optimizing hardware resources to implement AES on FPGA. The methods of optimization include on the fly computations and looping architecture, where all these of methods re...
Master's thesis Information- and communication technology IKT590 - University of Agder 2018Web acces...
Machine scheduling has long been a focus of engineering research. To stay competitive,industry recog...
We envisage a fine-grained access control solution that allows a user's access privilege to be linke...
Cloud Computing has grown exponentially in popularity in the last few years, becoming a key technolo...
Error control coding techniques is a crucial part of digital communication systems. It is used to so...
Digital-to-analog converters (DACs) are essential operations in many digital systems which require d...
Quorum sensing (QS) is used to describe the communication between bacterial cells, whereby a coordin...
Nowadays, it is widely recognized that data security will play a central role in the design of IT de...
The bachelor’s thesis main objective is to develop a client-server application to monitor the activi...
The aim of this thesis is to use the concept of uncertainty to improve the effectiveness of Product ...
A performance bit rates of more than 6 Gb/s is deemed as a common standard in high-speed interconnec...
Masteroppgave i informasjons- og kommunikasjonsteknologi 2002 - Høgskolen i Agder, GrimstadThe growi...
PKI is often referred to as a pervasive substrate. This terminology is used to describe the technol...
Ultra-Wide Band (UWB) technology is one of the possible solutions for future short-range indoor data...
Modern video coding algorithms are becoming increasingly complex with the result that single general...
Master's thesis Information- and communication technology IKT590 - University of Agder 2018Web acces...
Machine scheduling has long been a focus of engineering research. To stay competitive,industry recog...
We envisage a fine-grained access control solution that allows a user's access privilege to be linke...
Cloud Computing has grown exponentially in popularity in the last few years, becoming a key technolo...
Error control coding techniques is a crucial part of digital communication systems. It is used to so...
Digital-to-analog converters (DACs) are essential operations in many digital systems which require d...
Quorum sensing (QS) is used to describe the communication between bacterial cells, whereby a coordin...
Nowadays, it is widely recognized that data security will play a central role in the design of IT de...
The bachelor’s thesis main objective is to develop a client-server application to monitor the activi...
The aim of this thesis is to use the concept of uncertainty to improve the effectiveness of Product ...
A performance bit rates of more than 6 Gb/s is deemed as a common standard in high-speed interconnec...
Masteroppgave i informasjons- og kommunikasjonsteknologi 2002 - Høgskolen i Agder, GrimstadThe growi...
PKI is often referred to as a pervasive substrate. This terminology is used to describe the technol...
Ultra-Wide Band (UWB) technology is one of the possible solutions for future short-range indoor data...
Modern video coding algorithms are becoming increasingly complex with the result that single general...
Master's thesis Information- and communication technology IKT590 - University of Agder 2018Web acces...
Machine scheduling has long been a focus of engineering research. To stay competitive,industry recog...
We envisage a fine-grained access control solution that allows a user's access privilege to be linke...