Literatura académica sobre el tema "AES CRYPTOGRAPHY"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "AES CRYPTOGRAPHY".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "AES CRYPTOGRAPHY"
Yang, Huiwei. "Application of Hybrid Encryption Algorithm in Hardware Encryption Interface Card". Security and Communication Networks 2022 (30 de mayo de 2022): 1–11. http://dx.doi.org/10.1155/2022/7794209.
Texto completoRaut, Kinjal. "A Comprehensive Review of Cryptographic Algorithms". International Journal for Research in Applied Science and Engineering Technology 9, n.º 12 (31 de diciembre de 2021): 1750–56. http://dx.doi.org/10.22214/ijraset.2021.39581.
Texto completoWang, Xing, Qiang Zhang y Xiao Peng Wei. "A New Encryption Method Based on Rijndael Algorithm and DNA Computing". Applied Mechanics and Materials 20-23 (enero de 2010): 1241–46. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1241.
Texto completoDhansukhbhai Patel, Dr Dipakkumar y Dr Subhashchandra Desai. "Securing textual information with an image in the image using a visual cryptography AES algorithm." International Journal of Enhanced Research in Management & Computer Applications 12, n.º 06 (2023): 75–90. http://dx.doi.org/10.55948/ijermca.2023.0611.
Texto completoAhamad, Md Martuza y Md Ibrahim Abdullah. "Comparison of Encryption Algorithms for Multimedia". Rajshahi University Journal of Science and Engineering 44 (19 de noviembre de 2016): 131–39. http://dx.doi.org/10.3329/rujse.v44i0.30398.
Texto completoSingh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications". Mathematical Statistician and Engineering Applications 70, n.º 1 (31 de enero de 2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.
Texto completoB S, Aditya y Sharadadevi Kaganurmath. "Use of Cryptography and Signing for Network Security". International Journal for Research in Applied Science and Engineering Technology 10, n.º 7 (31 de julio de 2022): 4080–83. http://dx.doi.org/10.22214/ijraset.2022.45926.
Texto completoArifianto, Sofyan, Shinta Permatasari y Aminudin Aminudin. "Modifikasi enkripsi dan dekripsi AES menggunakan polybius chiper dalam pengamanan data". Jurnal Repositor 1, n.º 2 (31 de diciembre de 2019): 117. http://dx.doi.org/10.22219/repositor.v1i2.808.
Texto completoKurbet, ejashwini C. y Jenitta J. "NANO-AES Security Algorithm for Image Cryptography". International Journal for Research in Applied Science and Engineering Technology 11, n.º 8 (31 de agosto de 2023): 742–46. http://dx.doi.org/10.22214/ijraset.2023.55238.
Texto completoTahir, Ari Shawkat. "A Modified Advanced Encryption Standard Algorithm for Image Encryption". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, n.º 11 (14 de agosto de 2015): 6258–67. http://dx.doi.org/10.24297/ijct.v14i11.1811.
Texto completoTesis sobre el tema "AES CRYPTOGRAPHY"
Islam, Naveed. "Cryptography based Visual Data Protection". Thesis, Montpellier 2, 2011. http://www.theses.fr/2011MON20178/document.
Texto completoDue to the advancements in the information and communication technologies, the transmission of multimedia data over secure or insecure communication channels has increased exponentially. The security of data in applications like safe storage, authentications, copyright protection,remote military image communication or confidential video-conferencing require new strategies for secure transmission. Two techniques are commonly used for the secure transmission of visual data, i.e. cryptography and steganography. Cryptography achieves security by using secret keysto make the data illegible while steganography aims to hide the data in some innocent carrier signal. For shared trust and distributed environment, secret sharing schemes provide sufficient security in various communication applications. The principal objective of this thesis is to achieveprotection of visual data especially images through modern cryptographic techniques. In this context, the focus of the work in perspective, is twofolded. The first part of our work focuses on the security of image data in shared environment while the second part focuses on the integrity ofimage data in the encrypted domain during transmission.We proposed a new sharing scheme for images which exploits the additive and multiplicative homomorphic properties of two well known public key cryptosystems, namely, the RSA and the Paillier. In traditional secret sharing schemes, the dealer partitions the secret into shares and distributethe shares to each of the player. Thus, none of the involved players participate in the creation of the shared secret and there is always a possibilitythat the dealer can cheat some player. On the contrary, the proposed approach employs the secret sharing scheme in a way that limits the influence of the dealer over the protocol by allowing each player to participate. The second part of our thesis emphasizes on the integrity of visual data during transmission. Data integrity means that the data have its complete structure during any operation like storage, transfer or retrieval. A single bit change in encrypted data can have catastrophic impact over the decrypted data. We address the problem of error correction in images encrypted using symmetric key cryptosystem of the Advanced Encryption Standard (AES) algorithm. Three methods are proposed to exploit the local statistics of the visual data and the encryption algorithm to successfully correct the errors
Jean, Jérémy. "Cryptanalyse de primitives symétriques basées sur le chiffrement AES". Phd thesis, Ecole Normale Supérieure de Paris - ENS Paris, 2013. http://tel.archives-ouvertes.fr/tel-00911049.
Texto completoMantzouris, Panteleimon. "Computational algebraic attacks on the Advanced Encryption Standard (AES)". Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FMantzouris.pdf.
Texto completoThesis Advisor(s): Canright, David ; Butler, Jon. "September 2009." Description based on title screen as viewed on 5 November 2009. Author(s) subject terms: Advanced Encryption Standard (AES), Rijndael's algorithm, block cipher, decipher, round of the algorithm, sparse multivariate polynomial. Includes bibliographical references (p. 101). Also available in print.
Song, Beomsik. "Observations on the cryptologic properties of the AES algorithm". Access electronically, 2004. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20041028.102719/index.html.
Texto completoTaha, Mostafa Mohamed Ibrahim. "Advances in the Side-Channel Analysis of Symmetric Cryptography". Diss., Virginia Tech, 2014. http://hdl.handle.net/10919/79559.
Texto completoPh. D.
Dubois, Michel. "Conception, développement et analyse de systèmes de fonction booléennes décrivant les algorithmes de chiffrement et de déchiffrement de l'Advanced Encryption Standard". Thesis, Paris, ENSAM, 2017. http://www.theses.fr/2017ENAM0024/document.
Texto completoCryptology is one of the mathematical fields, it is composed of two subsets: cryptography and cryptanalysis. While cryptography focuses on algorithms to modify an information by making it unintelligible without knowledge of a secret, the second focuses on mathematical methods to recover the original information from the only knowledge of the encrypted element.Cryptography itself is subdivided into two subsets: symmetric cryptography and asymmetric cryptography. The first uses the same key for encryption and decryption operations, while the second uses one key for encryption and another key, different from the previous one, for decryption. Finally, symmetric cryptography is working either on blocks of information either on continuous flow of information. These are algorithms block cipher that interests us here.The aim of cryptanalysis is to recover the original information without knowing the encryption key and this, into a shorter time than the brute-force attack. There are many methods of cryptanalysis as frequency cryptanalysis, differential cryptanalysis, integral cryptanalysis, linear cryptanalysis...Many of these methods are defeated by modern encryption algorithms. Indeed, in a game of spear and shield, cryptographers develop encryption algorithms more efficient to protect the encrypted information from an attack by cryptanalysis. This is the case of the Advanced Encryption Standard (AES). This block cipher algorithm was designed by Joan Daemen and Vincent Rijmen and transformed into standard by the National Institute of Standards and Technology (NIST) in 2001. To counter the usual methods of cryptanalysis of AES designers have given it a strong algebraic structure.This choice eliminates brilliantly any possibility of statistical attack, however, recent work suggests that what is supposed to be the strength of the AES, could prove to be his weak point. According to these studies, the AES cryptanalysis comes down to ``solve'' a quadratic equations symbolizing the structure of the AES encryption. Unfortunately, the size of the system of equations obtained and the lack of efficient resolution algorithms make it impossible, at this time, to solve such systems in a reasonable time.The challenge of this thesis is, from the algebraic structure of the AES, to describe its encryption and decryption processes in the form of a new Boolean equations system. Then, based on a specific representation of these equations, to achieve a combinatorial analysis to detect potential statistical biases
Shah, Milap. "Parallel Aes diffusion inter block diffusion at bit level and compression". Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42449.
Texto completoDidjurgis, Marius. "Duomenų apsaugos metodų tyrimas". Master's thesis, Lithuanian Academic Libraries Network (LABT), 2010. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20100826_110944-00030.
Texto completoData protection problem is relevant in now days living. This paper takes a review of the existing methods and programs in digital data cryptography. Also it explains AES (advanced encryption standard) method, the most trustful one and overviews software tool, that was coded and used in experiments analysing this algorithm. The new AES class, that was created in this project, is compared using few parameters with the older one, created by Microsoft. Despite the only purpose, to create a better program, the older implemented AES cipher class and it’s methods beats the new one.
Odelberg, David y Carl Rasmus Holm. "Distributed cipher chaining for increased security in password storage". Thesis, Linköpings universitet, Datorteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-107484.
Texto completoShvartsman, Phillip. "Side-Channel-Attack Resistant AES Design Based on Finite Field Construction Variation". The Ohio State University, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=osu1555438117106036.
Texto completoLibros sobre el tema "AES CRYPTOGRAPHY"
Sokolov, Artem y Oleg Zhdanov. Cryptographic constructions on the basis of functions of multivalued logic. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1045434.
Texto completoTaĭnopisʹ v risunkakh A.S. Pushkina: Razgadka koda genii︠a︡. Moskva: Pokolenie, 2007.
Buscar texto completoMaksurov, Aleksey. Ensuring information security on the Internet. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.
Texto completoAlta.) WIN (Conference) (2nd 2011 Banff. Women in Numbers 2: Research directions in number theory : BIRS Workshop, WIN2 - Women in Numbers 2, November 6-11, 2011, Banff International Research Station, Banff, Alberta, Canada. Editado por David Chantal 1964-, Lalín Matilde 1977- y Manes Michelle 1970-. Providence, Rhode Island: American Mathematical Society, 2013.
Buscar texto completoThe Design of Rijndael: AES - The Advanced Encryption Standard (Information Security and Cryptography). Springer, 2002.
Buscar texto completoMartin, Keith M. Cryptographic Applications. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0012.
Texto completoMartin, Keith M. Control of Cryptography. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0014.
Texto completoMartin, Keith M. Basic Principles. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0001.
Texto completoMartin, Keith. Everyday Cryptography. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.001.0001.
Texto completoBos, Joppe y Martijn Stam, eds. Computational Cryptography. Cambridge University Press, 2021. http://dx.doi.org/10.1017/9781108854207.
Texto completoCapítulos de libros sobre el tema "AES CRYPTOGRAPHY"
Buchmann, Johannes A. "AES". En Introduction to Cryptography, 139–49. New York, NY: Springer New York, 2004. http://dx.doi.org/10.1007/978-1-4419-9003-7_6.
Texto completoKnudsen, Lars R. y Matthew J. B. Robshaw. "AES". En Information Security and Cryptography, 35–64. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-17342-4_3.
Texto completoNikolić, Ivica. "Tweaking AES". En Selected Areas in Cryptography, 198–210. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19574-7_14.
Texto completoRobertazzi, Thomas G. "AES and Quantum Cryptography". En Introduction to Computer Networking, 129–40. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-53103-8_11.
Texto completoPaar, Christof y Jan Pelzl. "The Advanced Encryption Standard (AES)". En Understanding Cryptography, 87–121. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-04101-3_4.
Texto completoDamgård, Ivan y Marcel Keller. "Secure Multiparty AES". En Financial Cryptography and Data Security, 367–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14577-3_31.
Texto completoCanright, David y Dag Arne Osvik. "A More Compact AES". En Selected Areas in Cryptography, 157–69. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05445-7_10.
Texto completoBlömer, Johannes, Jorge Guajardo y Volker Krummel. "Provably Secure Masking of AES". En Selected Areas in Cryptography, 69–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30564-4_5.
Texto completoGrassi, Lorenzo, Gregor Leander, Christian Rechberger, Cihangir Tezcan y Friedrich Wiemer. "Weak-Key Distinguishers for AES". En Selected Areas in Cryptography, 141–70. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81652-0_6.
Texto completoBertoni, Guido M., Lorenzo Grassi y Filippo Melzani. "Simulations of Optical Emissions for Attacking AES and Masked AES". En Security, Privacy, and Applied Cryptography Engineering, 172–89. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24126-5_11.
Texto completoActas de conferencias sobre el tema "AES CRYPTOGRAPHY"
Alaoui-Ismaili, Z., A. Moussa, A. El Mourabit y K. Amechnoue. "Flexible hardware architecture for AES cryptography algorithm". En 2009 International Conference on Multimedia Computing and Systems (ICMCS). IEEE, 2009. http://dx.doi.org/10.1109/mmcs.2009.5256655.
Texto completoRad, Nima Behnood y Hamed Shah-Hosseini. "GBHE: Grid-Based Cryptography with AES Algorithm". En 2008 International Conference on Computer and Electrical Engineering (ICCEE). IEEE, 2008. http://dx.doi.org/10.1109/iccee.2008.36.
Texto completoGupta, Aryansh, Anwar Ali, Aditya Kumar Pandey, Ankit Kumar Gupta y Abhinandan Tripathi. "Metamorphic Cryptography Using AES and LSB Method". En 2022 International Conference on Advances in Computing, Communication and Materials (ICACCM). IEEE, 2022. http://dx.doi.org/10.1109/icaccm56405.2022.10009381.
Texto completoChen, Chin-Sheng, Siang-Yu Chiu y Shih-Yu Li. "AES Encryption Method Based on Chaotic Cryptography". En 2023 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan). IEEE, 2023. http://dx.doi.org/10.1109/icce-taiwan58799.2023.10226728.
Texto completoFloissac, Noemie y Yann L'Hyver. "From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks on Key Expansion". En 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE, 2011. http://dx.doi.org/10.1109/fdtc.2011.15.
Texto completoKim, Chong Hee. "Differential Fault Analysis against AES-192 and AES-256 with Minimal Faults". En 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE, 2010. http://dx.doi.org/10.1109/fdtc.2010.10.
Texto completo"Improved “Partial Sums”-based Square Attack on AES". En International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2012. http://dx.doi.org/10.5220/0003990300250034.
Texto completoIrmanova, Aidana y Martin Lukac. "AES 128 Encrypted Image Classification". En 2023 7th International Conference on Cryptography, Security and Privacy (CSP). IEEE, 2023. http://dx.doi.org/10.1109/csp58884.2023.00038.
Texto completoRane, Toshna, Shreya Godbole, Parth Gujar, Harshal More y Pravin Adivarekar. "Securing Images with AES and Visual Cryptography Techniques". En 2023 4th International Conference for Emerging Technology (INCET). IEEE, 2023. http://dx.doi.org/10.1109/incet57972.2023.10170070.
Texto completoBettale, Luk, Emmanuelle Dottax y Mailody Ramphort. "Algebraic Side-Channel Attacks on Masked Implementations of AES". En International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2018. http://dx.doi.org/10.5220/0006869502580269.
Texto completoInformes sobre el tema "AES CRYPTOGRAPHY"
McGrew, D., D. Bailey, M. Campagna y R. Dugal. AES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites for TLS. RFC Editor, junio de 2014. http://dx.doi.org/10.17487/rfc7251.
Texto completoMouha, Nicky. Review of the Advanced Encryption Standard. National Institute of Standards and Technology, julio de 2021. http://dx.doi.org/10.6028/nist.ir.8319.
Texto completode Abreu, Jonas y Mariana Cunha e Melo. Extending Pix: An approach to offline Dynamic QR Code generation. Center for Technology and Public Interest, SL, abril de 2023. http://dx.doi.org/10.59262/9qu6ex.
Texto completoHousley, R. Using AES-CCM and AES-GCM Authenticated Encryption in the Cryptographic Message Syntax (CMS). RFC Editor, noviembre de 2007. http://dx.doi.org/10.17487/rfc5084.
Texto completoHousley, R. Using the AES-GMAC Algorithm with the Cryptographic Message Syntax (CMS). RFC Editor, junio de 2021. http://dx.doi.org/10.17487/rfc9044.
Texto completoTaiber, Joachim. Unsettled Topics Concerning the Impact of Quantum Technologies on Automotive Cybersecurity. SAE International, diciembre de 2020. http://dx.doi.org/10.4271/epr2020026.
Texto completoSchaad, J. Use of the Advanced Encryption Standard (AES) Encryption Algorithm in Cryptographic Message Syntax (CMS). RFC Editor, julio de 2003. http://dx.doi.org/10.17487/rfc3565.
Texto completoDolotii, Marharyta H. y Pavlo V. Merzlykin. Using the random number generator with a hardware entropy source for symmetric cryptography problems. [б. в.], diciembre de 2018. http://dx.doi.org/10.31812/123456789/2883.
Texto completoIorga, Michaela y Carroll Brickenkamp. National Voluntary Laboratory Accreditation Program (NVLAP) cryptographic and security testing. Gaithersburg, MD: National Institute of Standards and Technology (U.S.), junio de 2008. http://dx.doi.org/10.6028/nist.hb.150-17e2008.
Texto completoAllende López, Marcos, Diego López, Sergio Cerón, Antonio Leal, Adrián Pareja, Marcelo Da Silva, Alejandro Pardo et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, junio de 2021. http://dx.doi.org/10.18235/0003313.
Texto completo