Littérature scientifique sur le sujet « AES CRYPTOGRAPHY »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Sommaire
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « AES CRYPTOGRAPHY ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "AES CRYPTOGRAPHY"
Yang, Huiwei. « Application of Hybrid Encryption Algorithm in Hardware Encryption Interface Card ». Security and Communication Networks 2022 (30 mai 2022) : 1–11. http://dx.doi.org/10.1155/2022/7794209.
Texte intégralRaut, Kinjal. « A Comprehensive Review of Cryptographic Algorithms ». International Journal for Research in Applied Science and Engineering Technology 9, no 12 (31 décembre 2021) : 1750–56. http://dx.doi.org/10.22214/ijraset.2021.39581.
Texte intégralWang, Xing, Qiang Zhang et Xiao Peng Wei. « A New Encryption Method Based on Rijndael Algorithm and DNA Computing ». Applied Mechanics and Materials 20-23 (janvier 2010) : 1241–46. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1241.
Texte intégralDhansukhbhai Patel, Dr Dipakkumar, et Dr Subhashchandra Desai. « Securing textual information with an image in the image using a visual cryptography AES algorithm. » International Journal of Enhanced Research in Management & ; Computer Applications 12, no 06 (2023) : 75–90. http://dx.doi.org/10.55948/ijermca.2023.0611.
Texte intégralAhamad, Md Martuza, et Md Ibrahim Abdullah. « Comparison of Encryption Algorithms for Multimedia ». Rajshahi University Journal of Science and Engineering 44 (19 novembre 2016) : 131–39. http://dx.doi.org/10.3329/rujse.v44i0.30398.
Texte intégralSingh, Sukhveer. « Investigation of Cryptography for Secure Communication and Data Privacy Applications ». Mathematical Statistician and Engineering Applications 70, no 1 (31 janvier 2021) : 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.
Texte intégralB S, Aditya, et Sharadadevi Kaganurmath. « Use of Cryptography and Signing for Network Security ». International Journal for Research in Applied Science and Engineering Technology 10, no 7 (31 juillet 2022) : 4080–83. http://dx.doi.org/10.22214/ijraset.2022.45926.
Texte intégralArifianto, Sofyan, Shinta Permatasari et Aminudin Aminudin. « Modifikasi enkripsi dan dekripsi AES menggunakan polybius chiper dalam pengamanan data ». Jurnal Repositor 1, no 2 (31 décembre 2019) : 117. http://dx.doi.org/10.22219/repositor.v1i2.808.
Texte intégralKurbet, ejashwini C., et Jenitta J. « NANO-AES Security Algorithm for Image Cryptography ». International Journal for Research in Applied Science and Engineering Technology 11, no 8 (31 août 2023) : 742–46. http://dx.doi.org/10.22214/ijraset.2023.55238.
Texte intégralTahir, Ari Shawkat. « A Modified Advanced Encryption Standard Algorithm for Image Encryption ». INTERNATIONAL JOURNAL OF COMPUTERS & ; TECHNOLOGY 14, no 11 (14 août 2015) : 6258–67. http://dx.doi.org/10.24297/ijct.v14i11.1811.
Texte intégralThèses sur le sujet "AES CRYPTOGRAPHY"
Islam, Naveed. « Cryptography based Visual Data Protection ». Thesis, Montpellier 2, 2011. http://www.theses.fr/2011MON20178/document.
Texte intégralDue to the advancements in the information and communication technologies, the transmission of multimedia data over secure or insecure communication channels has increased exponentially. The security of data in applications like safe storage, authentications, copyright protection,remote military image communication or confidential video-conferencing require new strategies for secure transmission. Two techniques are commonly used for the secure transmission of visual data, i.e. cryptography and steganography. Cryptography achieves security by using secret keysto make the data illegible while steganography aims to hide the data in some innocent carrier signal. For shared trust and distributed environment, secret sharing schemes provide sufficient security in various communication applications. The principal objective of this thesis is to achieveprotection of visual data especially images through modern cryptographic techniques. In this context, the focus of the work in perspective, is twofolded. The first part of our work focuses on the security of image data in shared environment while the second part focuses on the integrity ofimage data in the encrypted domain during transmission.We proposed a new sharing scheme for images which exploits the additive and multiplicative homomorphic properties of two well known public key cryptosystems, namely, the RSA and the Paillier. In traditional secret sharing schemes, the dealer partitions the secret into shares and distributethe shares to each of the player. Thus, none of the involved players participate in the creation of the shared secret and there is always a possibilitythat the dealer can cheat some player. On the contrary, the proposed approach employs the secret sharing scheme in a way that limits the influence of the dealer over the protocol by allowing each player to participate. The second part of our thesis emphasizes on the integrity of visual data during transmission. Data integrity means that the data have its complete structure during any operation like storage, transfer or retrieval. A single bit change in encrypted data can have catastrophic impact over the decrypted data. We address the problem of error correction in images encrypted using symmetric key cryptosystem of the Advanced Encryption Standard (AES) algorithm. Three methods are proposed to exploit the local statistics of the visual data and the encryption algorithm to successfully correct the errors
Jean, Jérémy. « Cryptanalyse de primitives symétriques basées sur le chiffrement AES ». Phd thesis, Ecole Normale Supérieure de Paris - ENS Paris, 2013. http://tel.archives-ouvertes.fr/tel-00911049.
Texte intégralMantzouris, Panteleimon. « Computational algebraic attacks on the Advanced Encryption Standard (AES) ». Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FMantzouris.pdf.
Texte intégralThesis Advisor(s): Canright, David ; Butler, Jon. "September 2009." Description based on title screen as viewed on 5 November 2009. Author(s) subject terms: Advanced Encryption Standard (AES), Rijndael's algorithm, block cipher, decipher, round of the algorithm, sparse multivariate polynomial. Includes bibliographical references (p. 101). Also available in print.
Song, Beomsik. « Observations on the cryptologic properties of the AES algorithm ». Access electronically, 2004. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20041028.102719/index.html.
Texte intégralTaha, Mostafa Mohamed Ibrahim. « Advances in the Side-Channel Analysis of Symmetric Cryptography ». Diss., Virginia Tech, 2014. http://hdl.handle.net/10919/79559.
Texte intégralPh. D.
Dubois, Michel. « Conception, développement et analyse de systèmes de fonction booléennes décrivant les algorithmes de chiffrement et de déchiffrement de l'Advanced Encryption Standard ». Thesis, Paris, ENSAM, 2017. http://www.theses.fr/2017ENAM0024/document.
Texte intégralCryptology is one of the mathematical fields, it is composed of two subsets: cryptography and cryptanalysis. While cryptography focuses on algorithms to modify an information by making it unintelligible without knowledge of a secret, the second focuses on mathematical methods to recover the original information from the only knowledge of the encrypted element.Cryptography itself is subdivided into two subsets: symmetric cryptography and asymmetric cryptography. The first uses the same key for encryption and decryption operations, while the second uses one key for encryption and another key, different from the previous one, for decryption. Finally, symmetric cryptography is working either on blocks of information either on continuous flow of information. These are algorithms block cipher that interests us here.The aim of cryptanalysis is to recover the original information without knowing the encryption key and this, into a shorter time than the brute-force attack. There are many methods of cryptanalysis as frequency cryptanalysis, differential cryptanalysis, integral cryptanalysis, linear cryptanalysis...Many of these methods are defeated by modern encryption algorithms. Indeed, in a game of spear and shield, cryptographers develop encryption algorithms more efficient to protect the encrypted information from an attack by cryptanalysis. This is the case of the Advanced Encryption Standard (AES). This block cipher algorithm was designed by Joan Daemen and Vincent Rijmen and transformed into standard by the National Institute of Standards and Technology (NIST) in 2001. To counter the usual methods of cryptanalysis of AES designers have given it a strong algebraic structure.This choice eliminates brilliantly any possibility of statistical attack, however, recent work suggests that what is supposed to be the strength of the AES, could prove to be his weak point. According to these studies, the AES cryptanalysis comes down to ``solve'' a quadratic equations symbolizing the structure of the AES encryption. Unfortunately, the size of the system of equations obtained and the lack of efficient resolution algorithms make it impossible, at this time, to solve such systems in a reasonable time.The challenge of this thesis is, from the algebraic structure of the AES, to describe its encryption and decryption processes in the form of a new Boolean equations system. Then, based on a specific representation of these equations, to achieve a combinatorial analysis to detect potential statistical biases
Shah, Milap. « Parallel Aes diffusion inter block diffusion at bit level and compression ». Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42449.
Texte intégralDidjurgis, Marius. « Duomenų apsaugos metodų tyrimas ». Master's thesis, Lithuanian Academic Libraries Network (LABT), 2010. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20100826_110944-00030.
Texte intégralData protection problem is relevant in now days living. This paper takes a review of the existing methods and programs in digital data cryptography. Also it explains AES (advanced encryption standard) method, the most trustful one and overviews software tool, that was coded and used in experiments analysing this algorithm. The new AES class, that was created in this project, is compared using few parameters with the older one, created by Microsoft. Despite the only purpose, to create a better program, the older implemented AES cipher class and it’s methods beats the new one.
Odelberg, David, et Carl Rasmus Holm. « Distributed cipher chaining for increased security in password storage ». Thesis, Linköpings universitet, Datorteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-107484.
Texte intégralShvartsman, Phillip. « Side-Channel-Attack Resistant AES Design Based on Finite Field Construction Variation ». The Ohio State University, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=osu1555438117106036.
Texte intégralLivres sur le sujet "AES CRYPTOGRAPHY"
Sokolov, Artem, et Oleg Zhdanov. Cryptographic constructions on the basis of functions of multivalued logic. ru : INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1045434.
Texte intégralTaĭnopisʹ v risunkakh A.S. Pushkina : Razgadka koda genii︠a︡. Moskva : Pokolenie, 2007.
Trouver le texte intégralMaksurov, Aleksey. Ensuring information security on the Internet. ru : INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.
Texte intégralAlta.) WIN (Conference) (2nd 2011 Banff. Women in Numbers 2 : Research directions in number theory : BIRS Workshop, WIN2 - Women in Numbers 2, November 6-11, 2011, Banff International Research Station, Banff, Alberta, Canada. Sous la direction de David Chantal 1964-, Lalín Matilde 1977- et Manes Michelle 1970-. Providence, Rhode Island : American Mathematical Society, 2013.
Trouver le texte intégralThe Design of Rijndael : AES - The Advanced Encryption Standard (Information Security and Cryptography). Springer, 2002.
Trouver le texte intégralMartin, Keith M. Cryptographic Applications. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0012.
Texte intégralMartin, Keith M. Control of Cryptography. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0014.
Texte intégralMartin, Keith M. Basic Principles. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0001.
Texte intégralMartin, Keith. Everyday Cryptography. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.001.0001.
Texte intégralBos, Joppe, et Martijn Stam, dir. Computational Cryptography. Cambridge University Press, 2021. http://dx.doi.org/10.1017/9781108854207.
Texte intégralChapitres de livres sur le sujet "AES CRYPTOGRAPHY"
Buchmann, Johannes A. « AES ». Dans Introduction to Cryptography, 139–49. New York, NY : Springer New York, 2004. http://dx.doi.org/10.1007/978-1-4419-9003-7_6.
Texte intégralKnudsen, Lars R., et Matthew J. B. Robshaw. « AES ». Dans Information Security and Cryptography, 35–64. Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-17342-4_3.
Texte intégralNikolić, Ivica. « Tweaking AES ». Dans Selected Areas in Cryptography, 198–210. Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19574-7_14.
Texte intégralRobertazzi, Thomas G. « AES and Quantum Cryptography ». Dans Introduction to Computer Networking, 129–40. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-53103-8_11.
Texte intégralPaar, Christof, et Jan Pelzl. « The Advanced Encryption Standard (AES) ». Dans Understanding Cryptography, 87–121. Berlin, Heidelberg : Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-04101-3_4.
Texte intégralDamgård, Ivan, et Marcel Keller. « Secure Multiparty AES ». Dans Financial Cryptography and Data Security, 367–74. Berlin, Heidelberg : Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14577-3_31.
Texte intégralCanright, David, et Dag Arne Osvik. « A More Compact AES ». Dans Selected Areas in Cryptography, 157–69. Berlin, Heidelberg : Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05445-7_10.
Texte intégralBlömer, Johannes, Jorge Guajardo et Volker Krummel. « Provably Secure Masking of AES ». Dans Selected Areas in Cryptography, 69–83. Berlin, Heidelberg : Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30564-4_5.
Texte intégralGrassi, Lorenzo, Gregor Leander, Christian Rechberger, Cihangir Tezcan et Friedrich Wiemer. « Weak-Key Distinguishers for AES ». Dans Selected Areas in Cryptography, 141–70. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81652-0_6.
Texte intégralBertoni, Guido M., Lorenzo Grassi et Filippo Melzani. « Simulations of Optical Emissions for Attacking AES and Masked AES ». Dans Security, Privacy, and Applied Cryptography Engineering, 172–89. Cham : Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24126-5_11.
Texte intégralActes de conférences sur le sujet "AES CRYPTOGRAPHY"
Alaoui-Ismaili, Z., A. Moussa, A. El Mourabit et K. Amechnoue. « Flexible hardware architecture for AES cryptography algorithm ». Dans 2009 International Conference on Multimedia Computing and Systems (ICMCS). IEEE, 2009. http://dx.doi.org/10.1109/mmcs.2009.5256655.
Texte intégralRad, Nima Behnood, et Hamed Shah-Hosseini. « GBHE : Grid-Based Cryptography with AES Algorithm ». Dans 2008 International Conference on Computer and Electrical Engineering (ICCEE). IEEE, 2008. http://dx.doi.org/10.1109/iccee.2008.36.
Texte intégralGupta, Aryansh, Anwar Ali, Aditya Kumar Pandey, Ankit Kumar Gupta et Abhinandan Tripathi. « Metamorphic Cryptography Using AES and LSB Method ». Dans 2022 International Conference on Advances in Computing, Communication and Materials (ICACCM). IEEE, 2022. http://dx.doi.org/10.1109/icaccm56405.2022.10009381.
Texte intégralChen, Chin-Sheng, Siang-Yu Chiu et Shih-Yu Li. « AES Encryption Method Based on Chaotic Cryptography ». Dans 2023 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan). IEEE, 2023. http://dx.doi.org/10.1109/icce-taiwan58799.2023.10226728.
Texte intégralFloissac, Noemie, et Yann L'Hyver. « From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks on Key Expansion ». Dans 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE, 2011. http://dx.doi.org/10.1109/fdtc.2011.15.
Texte intégralKim, Chong Hee. « Differential Fault Analysis against AES-192 and AES-256 with Minimal Faults ». Dans 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE, 2010. http://dx.doi.org/10.1109/fdtc.2010.10.
Texte intégral« Improved “Partial Sums”-based Square Attack on AES ». Dans International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2012. http://dx.doi.org/10.5220/0003990300250034.
Texte intégralIrmanova, Aidana, et Martin Lukac. « AES 128 Encrypted Image Classification ». Dans 2023 7th International Conference on Cryptography, Security and Privacy (CSP). IEEE, 2023. http://dx.doi.org/10.1109/csp58884.2023.00038.
Texte intégralRane, Toshna, Shreya Godbole, Parth Gujar, Harshal More et Pravin Adivarekar. « Securing Images with AES and Visual Cryptography Techniques ». Dans 2023 4th International Conference for Emerging Technology (INCET). IEEE, 2023. http://dx.doi.org/10.1109/incet57972.2023.10170070.
Texte intégralBettale, Luk, Emmanuelle Dottax et Mailody Ramphort. « Algebraic Side-Channel Attacks on Masked Implementations of AES ». Dans International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2018. http://dx.doi.org/10.5220/0006869502580269.
Texte intégralRapports d'organisations sur le sujet "AES CRYPTOGRAPHY"
McGrew, D., D. Bailey, M. Campagna et R. Dugal. AES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites for TLS. RFC Editor, juin 2014. http://dx.doi.org/10.17487/rfc7251.
Texte intégralMouha, Nicky. Review of the Advanced Encryption Standard. National Institute of Standards and Technology, juillet 2021. http://dx.doi.org/10.6028/nist.ir.8319.
Texte intégralde Abreu, Jonas, et Mariana Cunha e Melo. Extending Pix : An approach to offline Dynamic QR Code generation. Center for Technology and Public Interest, SL, avril 2023. http://dx.doi.org/10.59262/9qu6ex.
Texte intégralHousley, R. Using AES-CCM and AES-GCM Authenticated Encryption in the Cryptographic Message Syntax (CMS). RFC Editor, novembre 2007. http://dx.doi.org/10.17487/rfc5084.
Texte intégralHousley, R. Using the AES-GMAC Algorithm with the Cryptographic Message Syntax (CMS). RFC Editor, juin 2021. http://dx.doi.org/10.17487/rfc9044.
Texte intégralTaiber, Joachim. Unsettled Topics Concerning the Impact of Quantum Technologies on Automotive Cybersecurity. SAE International, décembre 2020. http://dx.doi.org/10.4271/epr2020026.
Texte intégralSchaad, J. Use of the Advanced Encryption Standard (AES) Encryption Algorithm in Cryptographic Message Syntax (CMS). RFC Editor, juillet 2003. http://dx.doi.org/10.17487/rfc3565.
Texte intégralDolotii, Marharyta H., et Pavlo V. Merzlykin. Using the random number generator with a hardware entropy source for symmetric cryptography problems. [б. в.], décembre 2018. http://dx.doi.org/10.31812/123456789/2883.
Texte intégralIorga, Michaela, et Carroll Brickenkamp. National Voluntary Laboratory Accreditation Program (NVLAP) cryptographic and security testing. Gaithersburg, MD : National Institute of Standards and Technology (U.S.), juin 2008. http://dx.doi.org/10.6028/nist.hb.150-17e2008.
Texte intégralAllende López, Marcos, Diego López, Sergio Cerón, Antonio Leal, Adrián Pareja, Marcelo Da Silva, Alejandro Pardo et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, juin 2021. http://dx.doi.org/10.18235/0003313.
Texte intégral