Table of Contents Author Guidelines Submit a Manuscript
Journal of Electrical and Computer Engineering
Volume 2017, Article ID 9598581, 6 pages
Research Article

A Student Information Management System Based on Fingerprint Identification and Data Security Transmission

College of Electronic Information and Optical Engineering, Nankai University, Tianjin 300350, China

Correspondence should be addressed to Guiling Sun; nc.ude.iaknan@lgnus

Received 18 February 2017; Revised 17 July 2017; Accepted 17 August 2017; Published 19 September 2017

Academic Editor: Liangmin Wang

Copyright © 2017 Pengtao Yang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Z. Kai, “Design and implementation of college students' entrepreneurship management system based on B/S structure,” RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao, vol. 2016, no. 17, pp. 102–113, 2016. View at Google Scholar · View at Scopus
  2. S. R. Bharamagoudar, R. B. Geeta, and S. G. Totad, “Web based student information management system,” International Journal of Advanced Research in Computer and Communication Engineering, vol. 2, no. 6, 2013. View at Google Scholar
  3. R. Ahmad and W. Ismail, “Performance comparison of advanced encryption standard-128 algorithms for wimax application with improved power-throughput,” Journal of Engineering Science and Technology, vol. 11, no. 12, pp. 1678–1694, 2016. View at Google Scholar · View at Scopus
  4. J. Daor, J. Daemen, and V. Rijmen, “Aes proposal: rijndael. Vazirani, efficient and secure pseudo-random number generation,” in Proceedings of the 25th IEEE FOCS, 1999.
  5. STMicroelectronics, STM32 Reference Manual, 10th edition, 2009.
  6. US Department of Commerce and NIST, “Advanced Encryption Standard,” in Proceedings of the National Computer Conference, pp. 83–87, 2006.
  7. R. Ahmad and W. Ismail, “A survey of high performance cryptography algorithms for WiMAX applications using SDR,” Self-Organization and Green Applications in Cognitive Radio Networks, pp. 231–246, 2013. View at Publisher · View at Google Scholar · View at Scopus
  8. C. Monteiro, Y. Takahashi, and T. Sekine, “Low-power secure S-box circuit using charge-sharing symmetric adiabatic logic for advanced encryption standard hardware design,” IET Circuits, Devices and Systems, vol. 9, no. 5, pp. 362–369, 2015. View at Publisher · View at Google Scholar · View at Scopus
  9. A. M. Youssef and S. E. Tavares, “Affine equivalence in the AES round function,” Discrete Applied Mathematics, vol. 148, no. 2, pp. 161–170, 2005. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  10. G. Bertoni, L. Breveglieri, I. Koren, P. Maistri, and V. Piuri, “Error analysis and detection procedures for a hardware implementation of the advanced encryption standard,” IEEE Transactions on Computers, vol. 52, no. 4, pp. 492–505, 2003. View at Publisher · View at Google Scholar · View at Scopus
  11. J. Blömer and J. P. Seifert, “Fault Based Cryptanalysis of the Advanced Encryption Standard (AES),” in Proceedings of the Financial Cryptography, International Conference, FC 2003, vol. 2742, pp. 162–181, DBLP, Guadeloupe, French West Indies, France, 2003.
  12. J. Daemen and V. Rijmen, The Design of Rijndael: AES-The Advanced Encryption Standard, Springer, Berlin, Germany, 2002. View at Publisher · View at Google Scholar · View at MathSciNet
  13. B. Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C, Wiley Publishing, Indianapolis, IN, USA, 2015. View at Publisher · View at Google Scholar · View at MathSciNet
  14. W. Stallings, Cryptography and Network Security: Principles and Practice, 1999.
  15. M. McLoone and J. V. McCanny, “Rijndael FPGA implementation utilizing look-up tables,” in Proceedings of the IEEE Workshop on Signal Processing Systems-Design and Implementation-(SIPS) 2001, pp. 349–360, October 2001. View at Scopus
  16. J. Gong, W. Liu, and H. Zhang, “Multiple lookup table-based aes encryption algorithm implementation,” Physics Procedia, vol. 25, pp. 842–847, 2012. View at Google Scholar
  17. J.-F. Wang, S.-W. Chang, and P.-C. Lin, “A novel round function architecture for AES encryption/decryption utilizing look-up table,” in Proceedings of the 37th Annual 2003 International Carnahan Conference on Security Technology, pp. 132–136, October 2003. View at Scopus