Journal articles on the topic 'AES CRYPTOGRAPHY'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'AES CRYPTOGRAPHY.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yang, Huiwei. "Application of Hybrid Encryption Algorithm in Hardware Encryption Interface Card." Security and Communication Networks 2022 (May 30, 2022): 1–11. http://dx.doi.org/10.1155/2022/7794209.
Full textRaut, Kinjal. "A Comprehensive Review of Cryptographic Algorithms." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (December 31, 2021): 1750–56. http://dx.doi.org/10.22214/ijraset.2021.39581.
Full textWang, Xing, Qiang Zhang, and Xiao Peng Wei. "A New Encryption Method Based on Rijndael Algorithm and DNA Computing." Applied Mechanics and Materials 20-23 (January 2010): 1241–46. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1241.
Full textDhansukhbhai Patel, Dr Dipakkumar, and Dr Subhashchandra Desai. "Securing textual information with an image in the image using a visual cryptography AES algorithm." International Journal of Enhanced Research in Management & Computer Applications 12, no. 06 (2023): 75–90. http://dx.doi.org/10.55948/ijermca.2023.0611.
Full textAhamad, Md Martuza, and Md Ibrahim Abdullah. "Comparison of Encryption Algorithms for Multimedia." Rajshahi University Journal of Science and Engineering 44 (November 19, 2016): 131–39. http://dx.doi.org/10.3329/rujse.v44i0.30398.
Full textSingh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications." Mathematical Statistician and Engineering Applications 70, no. 1 (January 31, 2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.
Full textB S, Aditya, and Sharadadevi Kaganurmath. "Use of Cryptography and Signing for Network Security." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (July 31, 2022): 4080–83. http://dx.doi.org/10.22214/ijraset.2022.45926.
Full textArifianto, Sofyan, Shinta Permatasari, and Aminudin Aminudin. "Modifikasi enkripsi dan dekripsi AES menggunakan polybius chiper dalam pengamanan data." Jurnal Repositor 1, no. 2 (December 31, 2019): 117. http://dx.doi.org/10.22219/repositor.v1i2.808.
Full textKurbet, ejashwini C., and Jenitta J. "NANO-AES Security Algorithm for Image Cryptography." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (August 31, 2023): 742–46. http://dx.doi.org/10.22214/ijraset.2023.55238.
Full textTahir, Ari Shawkat. "A Modified Advanced Encryption Standard Algorithm for Image Encryption." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 11 (August 14, 2015): 6258–67. http://dx.doi.org/10.24297/ijct.v14i11.1811.
Full textShah, Aayush, Prabhat Mahato, and Aadarsh Bhagat. "Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (August 31, 2023): 1626–42. http://dx.doi.org/10.22214/ijraset.2023.55341.
Full textSatapure, Pratiksha. "Different Methods of Encryption and Decryption." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (November 30, 2021): 170–77. http://dx.doi.org/10.22214/ijraset.2021.38732.
Full textMustika, Laila. "Implementasi Algoritma AES Untuk Pengamanan Login Dan Data Customer Pada E-Commerce Berbasis Web." JURIKOM (Jurnal Riset Komputer) 7, no. 1 (February 15, 2020): 148. http://dx.doi.org/10.30865/jurikom.v7i1.1943.
Full textVerma, Rohit, and Aman Kumar Sharma. "Cryptography: Avalanche effect of AES and RSA." International Journal of Scientific and Research Publications (IJSRP) 10, no. 4 (April 6, 2020): p10013. http://dx.doi.org/10.29322/ijsrp.10.04.2020.p10013.
Full textAllakany, Alaa, Abeer Saber, Samih M. Mostafa, Maazen Alsabaan, Mohamed I. Ibrahem, and Haitham Elwahsh. "Enhancing Security in ZigBee Wireless Sensor Networks: A New Approach and Mutual Authentication Scheme for D2D Communication." Sensors 23, no. 12 (June 19, 2023): 5703. http://dx.doi.org/10.3390/s23125703.
Full textSweatha, A. Anjalin, and K. Mohaideen Pitchai. "Construction of Cryptographically Secure AES S-Box using Second-order Reversible Cellular Automata." Journal of Intelligent & Fuzzy Systems 39, no. 3 (October 7, 2020): 4313–18. http://dx.doi.org/10.3233/jifs-200326.
Full textO. O, Rejuaro, Adetunji A. B., Adedeji F., Falohun A. S., Iromini N. A., and Adebajo O. O. "Development of an Improved Access Control System using an Enhanced Bimodal Crypto-Biometric System." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 752–68. http://dx.doi.org/10.22214/ijraset.2023.49548.
Full textOlaniyan, Olatayo Moses, Ayobami Taiwo Olusesi, Bolaji Abigail Omodunbi, Wajeed Bolanle Wahab, Olusogo Julius Adetunji, and Bamidele Musiliu Olukoya. "A Data Security Model for Mobile Ad Hoc Network Using Linear Function Mayfly Advanced Encryption Standard." International Journal of Emerging Technology and Advanced Engineering 13, no. 3 (March 1, 2023): 101–10. http://dx.doi.org/10.46338/ijetae0323_10.
Full textMohammad, Hussein M., and Alharith A. Abdullah. "Enhancement process of AES: a lightweight cryptography algorithm-AES for constrained devices." TELKOMNIKA (Telecommunication Computing Electronics and Control) 20, no. 3 (June 1, 2022): 551. http://dx.doi.org/10.12928/telkomnika.v20i3.23297.
Full textEt. al., Arsha Kolate,. "An Information Security Using DNA Cryptography along with AES Algorithm." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 1S (April 11, 2021): 183–92. http://dx.doi.org/10.17762/turcomat.v12i1s.1607.
Full textYan, Tian Yun, Kai Kuo Xu, Min Wei, and Jia He. "Studies on Security Communications of Embedded Devices." Advanced Materials Research 216 (March 2011): 609–12. http://dx.doi.org/10.4028/www.scientific.net/amr.216.609.
Full textT, Ramya, Ramya G, Karthik Raju, Ravi J, and Deepak Verma. "An Efficient AES Algorithm for Cryptography Using VLSI." ECS Transactions 107, no. 1 (April 24, 2022): 5605–12. http://dx.doi.org/10.1149/10701.5605ecst.
Full textVijayarajan, R., P. Gnanasivam, and R. Avudaiammal. "Bio-Key Based AES for Personalized Image Cryptography." Computer Journal 62, no. 11 (April 10, 2019): 1695–705. http://dx.doi.org/10.1093/comjnl/bxz030.
Full textSingh, Pankaj, and Sachin Kumar. "Study & analysis of cryptography algorithms : RSA, AES, DES, T-DES, blowfish." International Journal of Engineering & Technology 7, no. 1.5 (December 31, 2017): 221. http://dx.doi.org/10.14419/ijet.v7i1.5.9150.
Full textSinghal, Yash, Adwit Agarwal, Shivank Mittal, Shristi Katyayani, and Amit Sharma. "Database Security using Cryptography." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 582–87. http://dx.doi.org/10.22214/ijraset.2022.43621.
Full textTabeidi, Rania A., and Samia M. Masaad. "Survey and Analysis of the Evolution of Wireless Security in IEEE 802.11 Standards using Advanced Encryption Standard (AES)." Circulation in Computer Science 2, no. 10 (November 20, 2017): 1–7. http://dx.doi.org/10.22632/ccs-2017-252-01.
Full textChang, Lipeng, Yuechuan Wei, Xiangru Wang, and Xiaozhong Pan. "Collision Forgery Attack on the AES-OTR Algorithm under Quantum Computing." Symmetry 14, no. 7 (July 13, 2022): 1434. http://dx.doi.org/10.3390/sym14071434.
Full textBagul, Riya, Atharva Karaguppi, Vishwas Karale, Mudit Singal, and Dr Vaishali Ingale. "A Dynamic and Highly Configurable Crypto-Processor for brief communication interval." Journal of University of Shanghai for Science and Technology 23, no. 05 (May 25, 2021): 551–61. http://dx.doi.org/10.51201/jusst/21/05162.
Full textChowdhary, Chiranji Lal, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan Perumal, and Muhammad Fazal Ijaz. "Analytical Study of Hybrid Techniques for Image Encryption and Decryption." Sensors 20, no. 18 (September 10, 2020): 5162. http://dx.doi.org/10.3390/s20185162.
Full textShukla, Piyush Kumar, Amer Aljaedi, Piyush Kumar Pareek, Adel R. Alharbi, and Sajjad Shaukat Jamal. "AES Based White Box Cryptography in Digital Signature Verification." Sensors 22, no. 23 (December 2, 2022): 9444. http://dx.doi.org/10.3390/s22239444.
Full textLi, Juan. "A Symmetric Cryptography Algorithm in Wireless Sensor Network Security." International Journal of Online Engineering (iJOE) 13, no. 11 (November 22, 2017): 102. http://dx.doi.org/10.3991/ijoe.v13i11.7752.
Full textOukili, Soufiane, and Seddik Bri. "Hardware Implementation of AES Algorithm with Logic S-box." Journal of Circuits, Systems and Computers 26, no. 09 (April 24, 2017): 1750141. http://dx.doi.org/10.1142/s0218126617501419.
Full textEt. al., Pravin Soni,. "Performance Analysis of Cascaded Hybrid Symmetric Encryption Models." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 1699–708. http://dx.doi.org/10.17762/turcomat.v12i2.1506.
Full textAz, Maulyanda, Syafrial Fachri Pane, and Rolly Maulana Awangga. "Cryptography: Cryptography: Perancangan Middleware Web Service Encryptor menggunakan Triple Key MD5. Base64, dan AES." Jurnal Tekno Insentif 15, no. 2 (October 31, 2021): 65–75. http://dx.doi.org/10.36787/jti.v15i1.497.
Full textGayathri, P., Syed Umar, G. Sridevi, N. Bashwanth, and Royyuru Srikanth. "Hybrid Cryptography for Random-key Generation based on ECC Algorithm." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 3 (June 1, 2017): 1293. http://dx.doi.org/10.11591/ijece.v7i3.pp1293-1298.
Full textKumar, Thanikodi Manoj, Kasarla Satish Reddy, Stefano Rinaldi, Bidare Divakarachari Parameshachari, and Kavitha Arunachalam. "A Low Area High Speed FPGA Implementation of AES Architecture for Cryptography Application." Electronics 10, no. 16 (August 21, 2021): 2023. http://dx.doi.org/10.3390/electronics10162023.
Full textM, Santhanalakshmi, Ms Lakshana K, and Ms Shahitya G M. "Enhanced AES-256 cipher round algorithm for IoT applications." Scientific Temper 14, no. 01 (March 25, 2023): 184–90. http://dx.doi.org/10.58414/scientifictemper.2023.14.1.22.
Full textFazila, S., B. Reddaiah, S. Sai Ramya, B. J. Karuna Sagar, and C. Swetha. "Enhancing AES with Key Dependent S-Box and Transpose MDS Matrix." International Journal of Innovative Technology and Exploring Engineering 11, no. 9 (August 30, 2022): 61–66. http://dx.doi.org/10.35940/ijitee.g9245.0811922.
Full textG. Chaloop, Samir, and Mahmood Z. Abdullah. "ENHANCING HYBRID SECURITY APPROACH USING AES AND RSA ALGORITHMS." Journal of Engineering and Sustainable Development 25, no. 4 (July 1, 2021): 58–66. http://dx.doi.org/10.31272/jeasd.25.4.6.
Full textPyrkova, A. YU, and ZH E. Temirbekova. "Compare encryption performance across devices to ensure the security of the IOT." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 2 (November 1, 2020): 894. http://dx.doi.org/10.11591/ijeecs.v20.i2.pp894-902.
Full textSingh, Amritpal, Mohit Marwaha, Baljinder Singh, and Sandeep Singh. "Comparative Study of DES, 3DES, AES and RSA." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 9, no. 3 (July 21, 2013): 1162–70. http://dx.doi.org/10.24297/ijct.v9i3.3342.
Full textNurnaningsih, Desi, and Angga Aditya Permana. "RANCANGAN APLIKASI PENGAMANAN DATA DENGAN ALGORITMA ADVANCED ENCYPTION STANDARD (AES)." JURNAL TEKNIK INFORMATIKA 11, no. 2 (November 28, 2018): 177–86. http://dx.doi.org/10.15408/jti.v11i2.7811.
Full textTaufiqqurrachman, Taufiqurrachman, and Dani Elsandi. "Security Analysis and Encryption Time Comparison Description on Cryptography Advanced Encryption Standard (AES)." Jurnal Inovatif : Inovasi Teknologi Informasi dan Informatika 5, no. 1 (July 1, 2022): 60. http://dx.doi.org/10.32832/inova-tif.v5i1.8345.
Full textP, Varsha, and Dr V. Nanammal. "Image Cryptography Design Based on Nano AES Security Algorithm." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 590–93. http://dx.doi.org/10.22214/ijraset.2022.46613.
Full textFei, Xiongwei, Kenli Li, and Wangdong Yang. "A fast parallel cryptography algorithm based on AES-NI." Journal of Intelligent & Fuzzy Systems 31, no. 2 (July 22, 2016): 1099–107. http://dx.doi.org/10.3233/jifs-169039.
Full textAdlani, M. Adharis, and Ricky Eka Putra. "Pengamanan Mnemonic Phrase Menggunakan Modified Advanced Encryption Standart." Journal of Informatics and Computer Science (JINACS) 3, no. 04 (June 10, 2022): 425–34. http://dx.doi.org/10.26740/jinacs.v3n04.p425-434.
Full textMohamad, Rafidah. "Data hiding by using AES Algorithm." Wasit Journal of Computer and Mathematics Science 1, no. 4 (December 31, 2022): 112–19. http://dx.doi.org/10.31185/wjcm.82.
Full textKulkarni, Utkarsha, Rosemeen Mansuri, and Riya Adikane. "File Storage on Cloud Using Cryptography." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 1950–53. http://dx.doi.org/10.22214/ijraset.2022.42652.
Full textSivamurugan, D., and L. Raja. "SECURE ROUTING IN MANET USING HYBRID CRYPTOGRAPHY." International Journal of Research -GRANTHAALAYAH 5, no. 4 (April 30, 2017): 83–91. http://dx.doi.org/10.29121/granthaalayah.v5.i4.2017.1798.
Full textIftikhar, U., K. Asrar, M. Waqas, and S. A. Ali. "Evaluating the Performance Parameters of Cryptographic Algorithms for IOT-based Devices." Engineering, Technology & Applied Science Research 11, no. 6 (December 11, 2021): 7867–74. http://dx.doi.org/10.48084/etasr.4263.
Full text