@incollection{, 2EA9E7102F71A72688240FDE321FBF40 , author={{ShraddhaMore} and {Mumbai university}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1541120 } @incollection{b0, , title={{Implementation of AES algorithm on ARM processor for wireless network}} , author={{ ProfVinayak Bajirao Patil } and { Dr } and { LUttam } and { PallaviBombale } and { Hemant Dixit }} , journal={{International Journal of Advanced Research in Computer and Communication Engineering}} 2 , year={August 2013} } @incollection{b1, , title={{Implementation approaches for the advanced encryption standard algorithm}} , author={{ XinmiaoZhang } and { KeshabKParhi }} , booktitle={{IEEE Transactions}} , year={2002} } @incollection{b2, , title={{A high throughput low cost AES processor}} , author={{ Chih-PinSu } and { Tsung-FuLin } and { Chih-TsunHuang } and { Cheng-WenWu }} , booktitle={{IEEE Communications Magazine}} , year={2003} } @book{b3, , title={{Federal Information Processing Standards Publication 197}} , year={Nov. 2001} , note={Advanced Encryption Standard (AES)} } @incollection{b4, , title={{AES-128 Bit Algorithm Using Fully Pipelined Architecture for Secret Communication}} , author={{ MGnanambika } and { SAdilakshmi } and { DrNoorbasha }} , journal={{International Journal of Engineering Research and Applications}} 3 , year={March -April 2013} } @incollection{b5, , title={{AES Algorithm Using 512 Bit Key Implementationfor Secure Communication}} , author={{ RishabhJain } and { RahulJejurka2 } and { ShrikrishnaChopade } and { SomeshwarVaidya } and { MaheshSanap }} , journal={{International Journal of Innovative Research in Computerand Communication Engineering}} 2 , year={March 2014} } @incollection{b6, , title={{Implementation of AES algorithm on ARM processor for wireless network}} , author={{ ProfVinayak Bajirao Patil } and { Dr } and { LUttam } and { PallaviBombale } and { Hemant Dixit }} , journal={{International Journal of Advanced Research in Computer and Communication Engineering}} 2 , year={August 2013} } @incollection{b7, , title={{Efficient Implementation of AES}} , author={{ RituPahal } and { VikasKumar }} , journal={{International Journal of Advanced Research in Computer Science and Software Engineering}} 3 , year={July 2013} } @incollection{b8, , title={{Design and Implementation of Rijndael Encryption Algorithm Based on FPGA}} , author={{ KSoumya } and { GShyam Kishore }} , journal={{International Journal of Computer Science and Mobile Computing}} 2 9 , year={September 2013} } @incollection{b9, , title={{Network Security Using Cryptographic Techniques}} , author={{ SumedhaKaushik } and { AnkurSinghal }} , journal={{International Journal of Advanced Research in Computer Science and Software Engineering}} 2 , year={December 2012} } @incollection{b10, , title={{A Study of Encryption Algorithms AES, DES and RSA forSecurity}} , author={{ Dr } and { Prerna Mahajan & Abhishek } and { Sachdeva }} , booktitle={{Global Journal of Computer Science and Technology Network}} , year={2013} 13 } @incollection{b11, , title={{Architectural optimization for a 1.82 Gbits/sec VLSIimple mentation of the AES Rijndael algorithm}} , author={{ HKuo } and { IVerbauwhede }} , booktitle={{Proc. CHES}} CHESParis, France , year={2001. May 2001} } @incollection{b12, , title={{Comparison of power consumption and strict avalanche criteria at encryption/Decryption side of Different AES standards}} , author={{ NavrajKhatri } and { RajeevDhanda } and { JagtarSingh }} , journal={{International Journal Of Computational Engineering Research}} 2 , year={August 2012} } @incollection{b13, , title={{Programmable Cellular Automata Based Efficient Parallel AES Encryption Algorithm}} , author={{ DasDebasis } and { MisraRajiv }} , journal={{International Journal of Network Security & Its Applications (IJNSA)}} 3 6 204 , year={November 2011} } @incollection{b14, , title={{Advanced Encryption Standard Implemented on FPGA}} , author={{ SHiremath } and { M SSuma }} , booktitle={{IEEE Inter}} } @book{b15, , title={{Conf. Comp Elec Engin. (IECEE)}} , year={Dec.2009} 02 } @book{b16, , title={{Efficiency and Security of Data with Symmetric Encryption}} , author={{ ChehalRitika } and { SinghKuldeep }} } @incollection{b17, , title={{Robust First Two Rounds Access Driven Cache Timing Attack on AES}} , author={{ ZXinjie } and { WTao } and { MDong } and { ZYuanyuan } and { LZhaoyang }} , booktitle={{IEEE InternationalConference on Computer Science and Software Engineering}} Wuhan, Hubei, China , year={Dec. 2008} } @incollection{b18, , title={{Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems}} , author={{ PCKocher }} , booktitle={{16th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO)}} London UK , publisher={Springer-Verlag} , year={1996} } @book{b19, , title={{Cryptography and network security}} , author={{ WStallings }} } @incollection{b20, , title={{}} , author={{ JDaemen } and { VRijmen }} , journal={{Rijndael}} 2 }