Now showing items 1-1 of 1

    • Efficient ASIC implementation of advanced encryption standard 

      Joshi, Ashwini Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
      In spite of the many defense techniques, software vulnerabilities like buffer overflow, format string vulnerability and integer vulnerability is still exploited by attackers. These software vulnerabilities arise due to ...