Articoli di riviste sul tema "Standard Cryptosystems"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Standard Cryptosystems".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Arboleda, Edwin Romeroso, Carla Eunice R. Fenomeno e Joshua Z. Jimenez. "KED-AES algorithm: combined key encryption decryption and advance encryption standard algorithm". International Journal of Advances in Applied Sciences 8, n. 1 (1 marzo 2019): 44. http://dx.doi.org/10.11591/ijaas.v8.i1.pp44-53.
Testo completoMurillo-Escobar, Miguel Angel, Manuel Omar Meranza-Castillón, Rosa Martha López-Gutiérrez e César Cruz-Hernández. "Suggested Integral Analysis for Chaos-Based Image Cryptosystems". Entropy 21, n. 8 (20 agosto 2019): 815. http://dx.doi.org/10.3390/e21080815.
Testo completoA., Manikandan, e Anandan R. "Hybrid Facial Chaotic-based Graphical Encryption Technique for Cloud Environment". Webology 19, n. 1 (20 gennaio 2022): 3643–56. http://dx.doi.org/10.14704/web/v19i1/web19240.
Testo completoLabao, Alfonso, e Henry Adorna. "A CCA-PKE Secure-Cryptosystem Resilient to Randomness Reset and Secret-Key Leakage". Cryptography 6, n. 1 (4 gennaio 2022): 2. http://dx.doi.org/10.3390/cryptography6010002.
Testo completoZimmermann. "A Proposed Standard Format for RSA Cryptosystems". Computer 19, n. 9 (settembre 1986): 21–34. http://dx.doi.org/10.1109/mc.1986.1663326.
Testo completoK, Subhashini, Aarthi Lakshmi R, Arthi V e Hemalatha G. "Image Encryption using Convolutional Neural Network". ITM Web of Conferences 56 (2023): 05005. http://dx.doi.org/10.1051/itmconf/20235605005.
Testo completoHemasri, S., Dr S. Kiran, Dr A. Ranichitra e Dr A. Rajesh Kanna. "Improved Data Encryption Standard Algorithm using Zigzag Scan for Secured Data Transmission". International Journal of Innovative Technology and Exploring Engineering 12, n. 6 (30 maggio 2023): 26–37. http://dx.doi.org/10.35940/ijitee.f9516.0512623.
Testo completoJenifa Sabeena, S., e S. Antelin Vijila. "Moulded RSA and DES (MRDES) Algorithm for Data Security". International Journal on Recent and Innovation Trends in Computing and Communication 11, n. 2 (10 marzo 2023): 154–62. http://dx.doi.org/10.17762/ijritcc.v11i2.6140.
Testo completoSabeena, S. Jenifa, e S. Antelin Vijila. "Moulded RSA and DES (MRDES) Algorithm for Data Security". International Journal on Recent and Innovation Trends in Computing and Communication 10, n. 12 (31 dicembre 2022): 12–20. http://dx.doi.org/10.17762/ijritcc.v10i12.5836.
Testo completoSeptien-Hernandez, Jose-Antonio, Magali Arellano-Vazquez, Marco Antonio Contreras-Cruz e Juan-Pablo Ramirez-Paredes. "A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications". Sensors 22, n. 2 (9 gennaio 2022): 489. http://dx.doi.org/10.3390/s22020489.
Testo completoLu, Zhu e Wang. "A Novel S-Box Design Algorithm Based on a New Compound Chaotic System". Entropy 21, n. 10 (14 ottobre 2019): 1004. http://dx.doi.org/10.3390/e21101004.
Testo completoShtewi, Abdulkarim, Bahaa Eldin Hasan e Abd El Fatah Hegazy. "An Efficient Modified Advanced Encryption Standard (MAES) Adapted for Image Cryptosystems". International Conference on Electrical Engineering 7, n. 7 (1 maggio 2010): 1–11. http://dx.doi.org/10.21608/iceeng.2010.33293.
Testo completoReiter, Isaac, e Eric Landquist. "Determining Biases in the Card-Chameleon Cryptosystem". Communications on Number Theory and Combinatorial Theory 2, n. 1 (2021): 1–22. http://dx.doi.org/10.70013/z2tn4xw8.
Testo completoAmigó, J. M., e J. Szczepański. "Approximations of Dynamical Systems and Their Applications to Cryptography". International Journal of Bifurcation and Chaos 13, n. 07 (luglio 2003): 1937–48. http://dx.doi.org/10.1142/s0218127403007771.
Testo completoDachman-Soled, Dana, Huijing Gong, Mukul Kulkarni e Aria Shahverdi. "(In)Security of Ring-LWE Under Partial Key Exposure". Journal of Mathematical Cryptology 15, n. 1 (17 novembre 2020): 72–86. http://dx.doi.org/10.1515/jmc-2020-0075.
Testo completoAlagic, Gorjan, Stacey Jeffery, Maris Ozols e Alexander Poremba. "On Quantum Chosen-Ciphertext Attacks and Learning with Errors". Cryptography 4, n. 1 (21 marzo 2020): 10. http://dx.doi.org/10.3390/cryptography4010010.
Testo completoEjaz, Aisha, Ijaz Ali Shoukat, Umer Iqbal, Abdul Rauf e Afshan Kanwal. "A secure key dependent dynamic substitution method for symmetric cryptosystems". PeerJ Computer Science 7 (19 luglio 2021): e587. http://dx.doi.org/10.7717/peerj-cs.587.
Testo completoMartsenyuk, V. P., A. S. Sverstyuk, I. Ye Andrushchak e О. Yu Rechun. "Components and kay features of the analisis symmetric cryptocircuit". COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, n. 50 (31 marzo 2023): 65–70. http://dx.doi.org/10.36910/6775-2524-0560-2023-50-09.
Testo completoHu, Zhenji, e Jiafeng Xie. "Novel Hybrid-Size Digit-Serial Systolic Multiplier over GF(2m)". Symmetry 10, n. 11 (24 ottobre 2018): 540. http://dx.doi.org/10.3390/sym10110540.
Testo completoChevardin, V., e I. Lavryk. "Cryptosystems based on isomorphic transformations of elliptic curve points." Communication, informatization and cybersecurity systems and technologies, n. 5 (1 giugno 2024): 215–26. http://dx.doi.org/10.58254/viti.5.2024.19.215.
Testo completoM. Shafiq Surameery, Nigar. "Modified Advanced Encryption Standard for Boost Image Encryption". UHD Journal of Science and Technology 6, n. 1 (27 aprile 2022): 52–59. http://dx.doi.org/10.21928/uhdjst.v6n1y2022.pp52-59.
Testo completoLee, Jihye, Whijin Kim e Ji-Hoon Kim. "A Programmable Crypto-Processor for National Institute of Standards and Technology Post-Quantum Cryptography Standardization Based on the RISC-V Architecture". Sensors 23, n. 23 (25 novembre 2023): 9408. http://dx.doi.org/10.3390/s23239408.
Testo completoNitaj, Abderrahmane, e Tajjeeddine Rachidi. "Applications of Neural Network-Based AI in Cryptography". Cryptography 7, n. 3 (11 agosto 2023): 39. http://dx.doi.org/10.3390/cryptography7030039.
Testo completoAngelova, Vesela, e Yuri Borissov. "Plaintext Recovery in DES-like Cryptosystems Based on S-boxes with Embedded Parity Check". Serdica Journal of Computing 7, n. 3 (23 aprile 2014): 257–70. http://dx.doi.org/10.55630/sjc.2013.7.257-270.
Testo completoABDULHAMID, Mohanad, e Nyagathu GICHUKI. "Comparative Study of Cryptographic Algorithms". International Journal of Information Security and Cybercrime 8, n. 1 (28 giugno 2019): 13–22. http://dx.doi.org/10.19107/ijisc.2019.01.01.
Testo completoBabinkostova, Liljana, Ariana Chin, Aaron Kirtland, Vladyslav Nazarchuk e Esther Plotnick. "The polynomial learning with errors problem and the smearing condition". Journal of Mathematical Cryptology 16, n. 1 (1 gennaio 2022): 215–32. http://dx.doi.org/10.1515/jmc-2020-0035.
Testo completoKrokosz, Tomasz, Jarogniew Rykowski, Małgorzata Zajęcka, Robert Brzoza-Woch e Leszek Rutkowski. "Cryptographic Algorithms with Data Shorter than the Encryption Key, Based on LZW and Huffman Coding". Sensors 23, n. 17 (25 agosto 2023): 7408. http://dx.doi.org/10.3390/s23177408.
Testo completoCultice, Tyler, e Himanshu Thapliyal. "PUF-Based Post-Quantum CAN-FD Framework for Vehicular Security". Information 13, n. 8 (9 agosto 2022): 382. http://dx.doi.org/10.3390/info13080382.
Testo completoLuo, Hanguang, Guangjun Wen e Jian Su. "An Efficient Hardware-Based Fault-Tolerant Method for SMS4". MATEC Web of Conferences 208 (2018): 02005. http://dx.doi.org/10.1051/matecconf/201820802005.
Testo completoChowdhary, Chiranji Lal, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan Perumal e Muhammad Fazal Ijaz. "Analytical Study of Hybrid Techniques for Image Encryption and Decryption". Sensors 20, n. 18 (10 settembre 2020): 5162. http://dx.doi.org/10.3390/s20185162.
Testo completoBessalov, Anatoliy V. "CALCULATION OF PARAMETERS OF CRYPTIC CRIVIAE EDWARDS OVER THE FIELDS OF CHARACTERISTICS 5 AND 7". Cybersecurity: Education, Science, Technique, n. 1 (2018): 94–104. http://dx.doi.org/10.28925/2663-4023.2018.1.94104.
Testo completoSafaryan, Olga, Larissa Cherckesova, Nikita Lyashenko, Pavel Razumov, Vladislav Chumakov, Boris Akishin e Andrey Lobodenko. "Modern Hash Collision CyberAttacks and Methods of Their Detection and Neutralization". Journal of Physics: Conference Series 2131, n. 2 (1 dicembre 2021): 022099. http://dx.doi.org/10.1088/1742-6596/2131/2/022099.
Testo completoKulibaba, V. A. "Processes and methods for selecting system-wide parameters and analysis of resistance against third-party channel attacks for the key encapsulation mechanism DSTU 8961:2019". Radiotekhnika, n. 205 (2 luglio 2021): 71–78. http://dx.doi.org/10.30837/rt.2021.2.205.06.
Testo completoSaravanan, P., e P. Kalpana. "Performance Analysis of Reversible Finite Field Arithmetic Architectures Over GF(p) and GF(2m) in Elliptic Curve Cryptography". Journal of Circuits, Systems and Computers 24, n. 08 (12 agosto 2015): 1550122. http://dx.doi.org/10.1142/s0218126615501224.
Testo completoRabie, A., Kh El Shafie, A. Hammuoda e M. Rohiem. "Data ecryption based on multi-order FrFT, and FPGA implementation of DES algorith". International Journal of Reconfigurable and Embedded Systems (IJRES) 9, n. 2 (1 luglio 2020): 141. http://dx.doi.org/10.11591/ijres.v9.i2.pp141-152.
Testo completoAlkhatib, Mohammad, Talal Albalawi e Fahman Saeed. "Blockchain-Based Quality Assurance System for Academic Programs". Applied Sciences 14, n. 11 (4 giugno 2024): 4868. http://dx.doi.org/10.3390/app14114868.
Testo completoHafsa, Amal, Mohamed Gafsi, Jihene Malek e Mohsen Machhout. "FPGA Implementation of Improved Security Approach for Medical Image Encryption and Decryption". Scientific Programming 2021 (4 febbraio 2021): 1–20. http://dx.doi.org/10.1155/2021/6610655.
Testo completoAllakany, Alaa, Abeer Saber, Samih M. Mostafa, Maazen Alsabaan, Mohamed I. Ibrahem e Haitham Elwahsh. "Enhancing Security in ZigBee Wireless Sensor Networks: A New Approach and Mutual Authentication Scheme for D2D Communication". Sensors 23, n. 12 (19 giugno 2023): 5703. http://dx.doi.org/10.3390/s23125703.
Testo completoKim, Yewon, e Yongjin Yeom. "Accelerated implementation for testing IID assumption of NIST SP 800-90B using GPU". PeerJ Computer Science 7 (8 marzo 2021): e404. http://dx.doi.org/10.7717/peerj-cs.404.
Testo completoAlamer, Ahmed, Ben Soh e David E. Brumbaugh. "MICKEY 2.0.85: A Secure and Lighter MICKEY 2.0 Cipher Variant with Improved Power Consumption for Smaller Devices in the IoT". Symmetry 12, n. 1 (22 dicembre 2019): 32. http://dx.doi.org/10.3390/sym12010032.
Testo completoJin, Sunghyun, Philip Johansson, HeeSeok Kim e Seokhie Hong. "Enhancing Time-Frequency Analysis with Zero-Mean Preprocessing". Sensors 22, n. 7 (23 marzo 2022): 2477. http://dx.doi.org/10.3390/s22072477.
Testo completoSoares, Rafael I., Ney L. V. Calazans, Victor Lomné, Amine Dehbaoui, Philippe Maurine e Lionel Torres. "A GALS Pipeline DES Architecture to Increase Robustness against CPA and CEMA Attacks". Journal of Integrated Circuits and Systems 6, n. 1 (27 dicembre 2011): 25–34. http://dx.doi.org/10.29292/jics.v6i1.335.
Testo completoWang, Yaru, Haodong Jiang e Zhi Ma. "Quantum Misuse Attack on Frodo". Entropy 24, n. 10 (4 ottobre 2022): 1418. http://dx.doi.org/10.3390/e24101418.
Testo completoLing, San, Khoa Nguyen, Huaxiong Wang e Juanyang Zhang. "Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation". Computer Journal 62, n. 12 (18 novembre 2019): 1849–62. http://dx.doi.org/10.1093/comjnl/bxz079.
Testo completoDong, Siyue, Zhen Zhao, Baocang Wang, Wen Gao e Shanshan Zhang. "SM9 Identity-Based Encryption with Designated-Position Fuzzy Equality Test". Electronics 13, n. 7 (28 marzo 2024): 1256. http://dx.doi.org/10.3390/electronics13071256.
Testo completoHu, Xianghong, Xin Zheng, Shengshi Zhang, Weijun Li, Shuting Cai e Xiaoming Xiong. "A High-Performance Elliptic Curve Cryptographic Processor of SM2 over GF(p)". Electronics 8, n. 4 (14 aprile 2019): 431. http://dx.doi.org/10.3390/electronics8040431.
Testo completoZhou, Caixue. "A Certificate-Based Provable Data Possession Scheme in the Standard Model". Security and Communication Networks 2021 (2 settembre 2021): 1–12. http://dx.doi.org/10.1155/2021/9974485.
Testo completoOkazaki, Hiroyuki, e Yasunari Shidama. "Formalization of the Data Encryption Standard". Formalized Mathematics 20, n. 2 (1 dicembre 2012): 125–46. http://dx.doi.org/10.2478/v10037-012-0016-y.
Testo completoMohamed, Heba G. "BioGamal Based Authentication Scheme for Cloud Assisted IoT Based WBAN". European Journal of Electrical Engineering and Computer Science 6, n. 3 (26 maggio 2022): 11–18. http://dx.doi.org/10.24018/ejece.2022.6.3.437.
Testo completoMISHRA, D. C., R. K. SHARMA, MAYANK DAWAR e M. HANMANDLU. "TWO LAYERS OF SECURITY FOR COLOR VIDEO BY MATRIX AFFINE CIPHER WITH TWO-DIMENSIONAL DISCRETE WAVELET TRANSFORM". Fractals 23, n. 04 (dicembre 2015): 1550037. http://dx.doi.org/10.1142/s0218348x15500371.
Testo completo