Artículos de revistas sobre el tema "AES CRYPTOGRAPHY"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "AES CRYPTOGRAPHY".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Yang, Huiwei. "Application of Hybrid Encryption Algorithm in Hardware Encryption Interface Card". Security and Communication Networks 2022 (30 de mayo de 2022): 1–11. http://dx.doi.org/10.1155/2022/7794209.
Texto completoRaut, Kinjal. "A Comprehensive Review of Cryptographic Algorithms". International Journal for Research in Applied Science and Engineering Technology 9, n.º 12 (31 de diciembre de 2021): 1750–56. http://dx.doi.org/10.22214/ijraset.2021.39581.
Texto completoWang, Xing, Qiang Zhang y Xiao Peng Wei. "A New Encryption Method Based on Rijndael Algorithm and DNA Computing". Applied Mechanics and Materials 20-23 (enero de 2010): 1241–46. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1241.
Texto completoDhansukhbhai Patel, Dr Dipakkumar y Dr Subhashchandra Desai. "Securing textual information with an image in the image using a visual cryptography AES algorithm." International Journal of Enhanced Research in Management & Computer Applications 12, n.º 06 (2023): 75–90. http://dx.doi.org/10.55948/ijermca.2023.0611.
Texto completoAhamad, Md Martuza y Md Ibrahim Abdullah. "Comparison of Encryption Algorithms for Multimedia". Rajshahi University Journal of Science and Engineering 44 (19 de noviembre de 2016): 131–39. http://dx.doi.org/10.3329/rujse.v44i0.30398.
Texto completoSingh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications". Mathematical Statistician and Engineering Applications 70, n.º 1 (31 de enero de 2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.
Texto completoB S, Aditya y Sharadadevi Kaganurmath. "Use of Cryptography and Signing for Network Security". International Journal for Research in Applied Science and Engineering Technology 10, n.º 7 (31 de julio de 2022): 4080–83. http://dx.doi.org/10.22214/ijraset.2022.45926.
Texto completoArifianto, Sofyan, Shinta Permatasari y Aminudin Aminudin. "Modifikasi enkripsi dan dekripsi AES menggunakan polybius chiper dalam pengamanan data". Jurnal Repositor 1, n.º 2 (31 de diciembre de 2019): 117. http://dx.doi.org/10.22219/repositor.v1i2.808.
Texto completoKurbet, ejashwini C. y Jenitta J. "NANO-AES Security Algorithm for Image Cryptography". International Journal for Research in Applied Science and Engineering Technology 11, n.º 8 (31 de agosto de 2023): 742–46. http://dx.doi.org/10.22214/ijraset.2023.55238.
Texto completoTahir, Ari Shawkat. "A Modified Advanced Encryption Standard Algorithm for Image Encryption". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, n.º 11 (14 de agosto de 2015): 6258–67. http://dx.doi.org/10.24297/ijct.v14i11.1811.
Texto completoShah, Aayush, Prabhat Mahato y Aadarsh Bhagat. "Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm". International Journal for Research in Applied Science and Engineering Technology 11, n.º 8 (31 de agosto de 2023): 1626–42. http://dx.doi.org/10.22214/ijraset.2023.55341.
Texto completoSatapure, Pratiksha. "Different Methods of Encryption and Decryption". International Journal for Research in Applied Science and Engineering Technology 9, n.º 11 (30 de noviembre de 2021): 170–77. http://dx.doi.org/10.22214/ijraset.2021.38732.
Texto completoMustika, Laila. "Implementasi Algoritma AES Untuk Pengamanan Login Dan Data Customer Pada E-Commerce Berbasis Web". JURIKOM (Jurnal Riset Komputer) 7, n.º 1 (15 de febrero de 2020): 148. http://dx.doi.org/10.30865/jurikom.v7i1.1943.
Texto completoVerma, Rohit y Aman Kumar Sharma. "Cryptography: Avalanche effect of AES and RSA". International Journal of Scientific and Research Publications (IJSRP) 10, n.º 4 (6 de abril de 2020): p10013. http://dx.doi.org/10.29322/ijsrp.10.04.2020.p10013.
Texto completoAllakany, Alaa, Abeer Saber, Samih M. Mostafa, Maazen Alsabaan, Mohamed I. Ibrahem y Haitham Elwahsh. "Enhancing Security in ZigBee Wireless Sensor Networks: A New Approach and Mutual Authentication Scheme for D2D Communication". Sensors 23, n.º 12 (19 de junio de 2023): 5703. http://dx.doi.org/10.3390/s23125703.
Texto completoSweatha, A. Anjalin y K. Mohaideen Pitchai. "Construction of Cryptographically Secure AES S-Box using Second-order Reversible Cellular Automata". Journal of Intelligent & Fuzzy Systems 39, n.º 3 (7 de octubre de 2020): 4313–18. http://dx.doi.org/10.3233/jifs-200326.
Texto completoO. O, Rejuaro, Adetunji A. B., Adedeji F., Falohun A. S., Iromini N. A. y Adebajo O. O. "Development of an Improved Access Control System using an Enhanced Bimodal Crypto-Biometric System". International Journal for Research in Applied Science and Engineering Technology 11, n.º 5 (31 de mayo de 2023): 752–68. http://dx.doi.org/10.22214/ijraset.2023.49548.
Texto completoOlaniyan, Olatayo Moses, Ayobami Taiwo Olusesi, Bolaji Abigail Omodunbi, Wajeed Bolanle Wahab, Olusogo Julius Adetunji y Bamidele Musiliu Olukoya. "A Data Security Model for Mobile Ad Hoc Network Using Linear Function Mayfly Advanced Encryption Standard". International Journal of Emerging Technology and Advanced Engineering 13, n.º 3 (1 de marzo de 2023): 101–10. http://dx.doi.org/10.46338/ijetae0323_10.
Texto completoMohammad, Hussein M. y Alharith A. Abdullah. "Enhancement process of AES: a lightweight cryptography algorithm-AES for constrained devices". TELKOMNIKA (Telecommunication Computing Electronics and Control) 20, n.º 3 (1 de junio de 2022): 551. http://dx.doi.org/10.12928/telkomnika.v20i3.23297.
Texto completoEt. al., Arsha Kolate,. "An Information Security Using DNA Cryptography along with AES Algorithm". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, n.º 1S (11 de abril de 2021): 183–92. http://dx.doi.org/10.17762/turcomat.v12i1s.1607.
Texto completoYan, Tian Yun, Kai Kuo Xu, Min Wei y Jia He. "Studies on Security Communications of Embedded Devices". Advanced Materials Research 216 (marzo de 2011): 609–12. http://dx.doi.org/10.4028/www.scientific.net/amr.216.609.
Texto completoT, Ramya, Ramya G, Karthik Raju, Ravi J y Deepak Verma. "An Efficient AES Algorithm for Cryptography Using VLSI". ECS Transactions 107, n.º 1 (24 de abril de 2022): 5605–12. http://dx.doi.org/10.1149/10701.5605ecst.
Texto completoVijayarajan, R., P. Gnanasivam y R. Avudaiammal. "Bio-Key Based AES for Personalized Image Cryptography". Computer Journal 62, n.º 11 (10 de abril de 2019): 1695–705. http://dx.doi.org/10.1093/comjnl/bxz030.
Texto completoSingh, Pankaj y Sachin Kumar. "Study & analysis of cryptography algorithms : RSA, AES, DES, T-DES, blowfish". International Journal of Engineering & Technology 7, n.º 1.5 (31 de diciembre de 2017): 221. http://dx.doi.org/10.14419/ijet.v7i1.5.9150.
Texto completoSinghal, Yash, Adwit Agarwal, Shivank Mittal, Shristi Katyayani y Amit Sharma. "Database Security using Cryptography". International Journal for Research in Applied Science and Engineering Technology 10, n.º 6 (30 de junio de 2022): 582–87. http://dx.doi.org/10.22214/ijraset.2022.43621.
Texto completoTabeidi, Rania A. y Samia M. Masaad. "Survey and Analysis of the Evolution of Wireless Security in IEEE 802.11 Standards using Advanced Encryption Standard (AES)". Circulation in Computer Science 2, n.º 10 (20 de noviembre de 2017): 1–7. http://dx.doi.org/10.22632/ccs-2017-252-01.
Texto completoChang, Lipeng, Yuechuan Wei, Xiangru Wang y Xiaozhong Pan. "Collision Forgery Attack on the AES-OTR Algorithm under Quantum Computing". Symmetry 14, n.º 7 (13 de julio de 2022): 1434. http://dx.doi.org/10.3390/sym14071434.
Texto completoBagul, Riya, Atharva Karaguppi, Vishwas Karale, Mudit Singal y Dr Vaishali Ingale. "A Dynamic and Highly Configurable Crypto-Processor for brief communication interval". Journal of University of Shanghai for Science and Technology 23, n.º 05 (25 de mayo de 2021): 551–61. http://dx.doi.org/10.51201/jusst/21/05162.
Texto completoChowdhary, Chiranji Lal, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan Perumal y Muhammad Fazal Ijaz. "Analytical Study of Hybrid Techniques for Image Encryption and Decryption". Sensors 20, n.º 18 (10 de septiembre de 2020): 5162. http://dx.doi.org/10.3390/s20185162.
Texto completoShukla, Piyush Kumar, Amer Aljaedi, Piyush Kumar Pareek, Adel R. Alharbi y Sajjad Shaukat Jamal. "AES Based White Box Cryptography in Digital Signature Verification". Sensors 22, n.º 23 (2 de diciembre de 2022): 9444. http://dx.doi.org/10.3390/s22239444.
Texto completoLi, Juan. "A Symmetric Cryptography Algorithm in Wireless Sensor Network Security". International Journal of Online Engineering (iJOE) 13, n.º 11 (22 de noviembre de 2017): 102. http://dx.doi.org/10.3991/ijoe.v13i11.7752.
Texto completoOukili, Soufiane y Seddik Bri. "Hardware Implementation of AES Algorithm with Logic S-box". Journal of Circuits, Systems and Computers 26, n.º 09 (24 de abril de 2017): 1750141. http://dx.doi.org/10.1142/s0218126617501419.
Texto completoEt. al., Pravin Soni,. "Performance Analysis of Cascaded Hybrid Symmetric Encryption Models". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, n.º 2 (10 de abril de 2021): 1699–708. http://dx.doi.org/10.17762/turcomat.v12i2.1506.
Texto completoAz, Maulyanda, Syafrial Fachri Pane y Rolly Maulana Awangga. "Cryptography: Cryptography: Perancangan Middleware Web Service Encryptor menggunakan Triple Key MD5. Base64, dan AES". Jurnal Tekno Insentif 15, n.º 2 (31 de octubre de 2021): 65–75. http://dx.doi.org/10.36787/jti.v15i1.497.
Texto completoGayathri, P., Syed Umar, G. Sridevi, N. Bashwanth y Royyuru Srikanth. "Hybrid Cryptography for Random-key Generation based on ECC Algorithm". International Journal of Electrical and Computer Engineering (IJECE) 7, n.º 3 (1 de junio de 2017): 1293. http://dx.doi.org/10.11591/ijece.v7i3.pp1293-1298.
Texto completoKumar, Thanikodi Manoj, Kasarla Satish Reddy, Stefano Rinaldi, Bidare Divakarachari Parameshachari y Kavitha Arunachalam. "A Low Area High Speed FPGA Implementation of AES Architecture for Cryptography Application". Electronics 10, n.º 16 (21 de agosto de 2021): 2023. http://dx.doi.org/10.3390/electronics10162023.
Texto completoM, Santhanalakshmi, Ms Lakshana K y Ms Shahitya G M. "Enhanced AES-256 cipher round algorithm for IoT applications". Scientific Temper 14, n.º 01 (25 de marzo de 2023): 184–90. http://dx.doi.org/10.58414/scientifictemper.2023.14.1.22.
Texto completoFazila, S., B. Reddaiah, S. Sai Ramya, B. J. Karuna Sagar y C. Swetha. "Enhancing AES with Key Dependent S-Box and Transpose MDS Matrix". International Journal of Innovative Technology and Exploring Engineering 11, n.º 9 (30 de agosto de 2022): 61–66. http://dx.doi.org/10.35940/ijitee.g9245.0811922.
Texto completoG. Chaloop, Samir y Mahmood Z. Abdullah. "ENHANCING HYBRID SECURITY APPROACH USING AES AND RSA ALGORITHMS". Journal of Engineering and Sustainable Development 25, n.º 4 (1 de julio de 2021): 58–66. http://dx.doi.org/10.31272/jeasd.25.4.6.
Texto completoPyrkova, A. YU y ZH E. Temirbekova. "Compare encryption performance across devices to ensure the security of the IOT". Indonesian Journal of Electrical Engineering and Computer Science 20, n.º 2 (1 de noviembre de 2020): 894. http://dx.doi.org/10.11591/ijeecs.v20.i2.pp894-902.
Texto completoSingh, Amritpal, Mohit Marwaha, Baljinder Singh y Sandeep Singh. "Comparative Study of DES, 3DES, AES and RSA". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 9, n.º 3 (21 de julio de 2013): 1162–70. http://dx.doi.org/10.24297/ijct.v9i3.3342.
Texto completoNurnaningsih, Desi y Angga Aditya Permana. "RANCANGAN APLIKASI PENGAMANAN DATA DENGAN ALGORITMA ADVANCED ENCYPTION STANDARD (AES)". JURNAL TEKNIK INFORMATIKA 11, n.º 2 (28 de noviembre de 2018): 177–86. http://dx.doi.org/10.15408/jti.v11i2.7811.
Texto completoTaufiqqurrachman, Taufiqurrachman y Dani Elsandi. "Security Analysis and Encryption Time Comparison Description on Cryptography Advanced Encryption Standard (AES)". Jurnal Inovatif : Inovasi Teknologi Informasi dan Informatika 5, n.º 1 (1 de julio de 2022): 60. http://dx.doi.org/10.32832/inova-tif.v5i1.8345.
Texto completoP, Varsha y Dr V. Nanammal. "Image Cryptography Design Based on Nano AES Security Algorithm". International Journal for Research in Applied Science and Engineering Technology 10, n.º 9 (30 de septiembre de 2022): 590–93. http://dx.doi.org/10.22214/ijraset.2022.46613.
Texto completoFei, Xiongwei, Kenli Li y Wangdong Yang. "A fast parallel cryptography algorithm based on AES-NI". Journal of Intelligent & Fuzzy Systems 31, n.º 2 (22 de julio de 2016): 1099–107. http://dx.doi.org/10.3233/jifs-169039.
Texto completoAdlani, M. Adharis y Ricky Eka Putra. "Pengamanan Mnemonic Phrase Menggunakan Modified Advanced Encryption Standart". Journal of Informatics and Computer Science (JINACS) 3, n.º 04 (10 de junio de 2022): 425–34. http://dx.doi.org/10.26740/jinacs.v3n04.p425-434.
Texto completoMohamad, Rafidah. "Data hiding by using AES Algorithm". Wasit Journal of Computer and Mathematics Science 1, n.º 4 (31 de diciembre de 2022): 112–19. http://dx.doi.org/10.31185/wjcm.82.
Texto completoKulkarni, Utkarsha, Rosemeen Mansuri y Riya Adikane. "File Storage on Cloud Using Cryptography". International Journal for Research in Applied Science and Engineering Technology 10, n.º 5 (31 de mayo de 2022): 1950–53. http://dx.doi.org/10.22214/ijraset.2022.42652.
Texto completoSivamurugan, D. y L. Raja. "SECURE ROUTING IN MANET USING HYBRID CRYPTOGRAPHY". International Journal of Research -GRANTHAALAYAH 5, n.º 4 (30 de abril de 2017): 83–91. http://dx.doi.org/10.29121/granthaalayah.v5.i4.2017.1798.
Texto completoIftikhar, U., K. Asrar, M. Waqas y S. A. Ali. "Evaluating the Performance Parameters of Cryptographic Algorithms for IOT-based Devices". Engineering, Technology & Applied Science Research 11, n.º 6 (11 de diciembre de 2021): 7867–74. http://dx.doi.org/10.48084/etasr.4263.
Texto completo