Different Implementations of AES Cryptographic Algorithm | IEEE Conference Publication | IEEE Xplore