Gotowa bibliografia na temat „AES CRYPTOGRAPHY”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „AES CRYPTOGRAPHY”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "AES CRYPTOGRAPHY"
Yang, Huiwei. "Application of Hybrid Encryption Algorithm in Hardware Encryption Interface Card". Security and Communication Networks 2022 (30.05.2022): 1–11. http://dx.doi.org/10.1155/2022/7794209.
Pełny tekst źródłaRaut, Kinjal. "A Comprehensive Review of Cryptographic Algorithms". International Journal for Research in Applied Science and Engineering Technology 9, nr 12 (31.12.2021): 1750–56. http://dx.doi.org/10.22214/ijraset.2021.39581.
Pełny tekst źródłaWang, Xing, Qiang Zhang i Xiao Peng Wei. "A New Encryption Method Based on Rijndael Algorithm and DNA Computing". Applied Mechanics and Materials 20-23 (styczeń 2010): 1241–46. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1241.
Pełny tekst źródłaDhansukhbhai Patel, Dr Dipakkumar, i Dr Subhashchandra Desai. "Securing textual information with an image in the image using a visual cryptography AES algorithm." International Journal of Enhanced Research in Management & Computer Applications 12, nr 06 (2023): 75–90. http://dx.doi.org/10.55948/ijermca.2023.0611.
Pełny tekst źródłaAhamad, Md Martuza, i Md Ibrahim Abdullah. "Comparison of Encryption Algorithms for Multimedia". Rajshahi University Journal of Science and Engineering 44 (19.11.2016): 131–39. http://dx.doi.org/10.3329/rujse.v44i0.30398.
Pełny tekst źródłaSingh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications". Mathematical Statistician and Engineering Applications 70, nr 1 (31.01.2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.
Pełny tekst źródłaB S, Aditya, i Sharadadevi Kaganurmath. "Use of Cryptography and Signing for Network Security". International Journal for Research in Applied Science and Engineering Technology 10, nr 7 (31.07.2022): 4080–83. http://dx.doi.org/10.22214/ijraset.2022.45926.
Pełny tekst źródłaArifianto, Sofyan, Shinta Permatasari i Aminudin Aminudin. "Modifikasi enkripsi dan dekripsi AES menggunakan polybius chiper dalam pengamanan data". Jurnal Repositor 1, nr 2 (31.12.2019): 117. http://dx.doi.org/10.22219/repositor.v1i2.808.
Pełny tekst źródłaKurbet, ejashwini C., i Jenitta J. "NANO-AES Security Algorithm for Image Cryptography". International Journal for Research in Applied Science and Engineering Technology 11, nr 8 (31.08.2023): 742–46. http://dx.doi.org/10.22214/ijraset.2023.55238.
Pełny tekst źródłaTahir, Ari Shawkat. "A Modified Advanced Encryption Standard Algorithm for Image Encryption". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, nr 11 (14.08.2015): 6258–67. http://dx.doi.org/10.24297/ijct.v14i11.1811.
Pełny tekst źródłaRozprawy doktorskie na temat "AES CRYPTOGRAPHY"
Islam, Naveed. "Cryptography based Visual Data Protection". Thesis, Montpellier 2, 2011. http://www.theses.fr/2011MON20178/document.
Pełny tekst źródłaDue to the advancements in the information and communication technologies, the transmission of multimedia data over secure or insecure communication channels has increased exponentially. The security of data in applications like safe storage, authentications, copyright protection,remote military image communication or confidential video-conferencing require new strategies for secure transmission. Two techniques are commonly used for the secure transmission of visual data, i.e. cryptography and steganography. Cryptography achieves security by using secret keysto make the data illegible while steganography aims to hide the data in some innocent carrier signal. For shared trust and distributed environment, secret sharing schemes provide sufficient security in various communication applications. The principal objective of this thesis is to achieveprotection of visual data especially images through modern cryptographic techniques. In this context, the focus of the work in perspective, is twofolded. The first part of our work focuses on the security of image data in shared environment while the second part focuses on the integrity ofimage data in the encrypted domain during transmission.We proposed a new sharing scheme for images which exploits the additive and multiplicative homomorphic properties of two well known public key cryptosystems, namely, the RSA and the Paillier. In traditional secret sharing schemes, the dealer partitions the secret into shares and distributethe shares to each of the player. Thus, none of the involved players participate in the creation of the shared secret and there is always a possibilitythat the dealer can cheat some player. On the contrary, the proposed approach employs the secret sharing scheme in a way that limits the influence of the dealer over the protocol by allowing each player to participate. The second part of our thesis emphasizes on the integrity of visual data during transmission. Data integrity means that the data have its complete structure during any operation like storage, transfer or retrieval. A single bit change in encrypted data can have catastrophic impact over the decrypted data. We address the problem of error correction in images encrypted using symmetric key cryptosystem of the Advanced Encryption Standard (AES) algorithm. Three methods are proposed to exploit the local statistics of the visual data and the encryption algorithm to successfully correct the errors
Jean, Jérémy. "Cryptanalyse de primitives symétriques basées sur le chiffrement AES". Phd thesis, Ecole Normale Supérieure de Paris - ENS Paris, 2013. http://tel.archives-ouvertes.fr/tel-00911049.
Pełny tekst źródłaMantzouris, Panteleimon. "Computational algebraic attacks on the Advanced Encryption Standard (AES)". Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FMantzouris.pdf.
Pełny tekst źródłaThesis Advisor(s): Canright, David ; Butler, Jon. "September 2009." Description based on title screen as viewed on 5 November 2009. Author(s) subject terms: Advanced Encryption Standard (AES), Rijndael's algorithm, block cipher, decipher, round of the algorithm, sparse multivariate polynomial. Includes bibliographical references (p. 101). Also available in print.
Song, Beomsik. "Observations on the cryptologic properties of the AES algorithm". Access electronically, 2004. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20041028.102719/index.html.
Pełny tekst źródłaTaha, Mostafa Mohamed Ibrahim. "Advances in the Side-Channel Analysis of Symmetric Cryptography". Diss., Virginia Tech, 2014. http://hdl.handle.net/10919/79559.
Pełny tekst źródłaPh. D.
Dubois, Michel. "Conception, développement et analyse de systèmes de fonction booléennes décrivant les algorithmes de chiffrement et de déchiffrement de l'Advanced Encryption Standard". Thesis, Paris, ENSAM, 2017. http://www.theses.fr/2017ENAM0024/document.
Pełny tekst źródłaCryptology is one of the mathematical fields, it is composed of two subsets: cryptography and cryptanalysis. While cryptography focuses on algorithms to modify an information by making it unintelligible without knowledge of a secret, the second focuses on mathematical methods to recover the original information from the only knowledge of the encrypted element.Cryptography itself is subdivided into two subsets: symmetric cryptography and asymmetric cryptography. The first uses the same key for encryption and decryption operations, while the second uses one key for encryption and another key, different from the previous one, for decryption. Finally, symmetric cryptography is working either on blocks of information either on continuous flow of information. These are algorithms block cipher that interests us here.The aim of cryptanalysis is to recover the original information without knowing the encryption key and this, into a shorter time than the brute-force attack. There are many methods of cryptanalysis as frequency cryptanalysis, differential cryptanalysis, integral cryptanalysis, linear cryptanalysis...Many of these methods are defeated by modern encryption algorithms. Indeed, in a game of spear and shield, cryptographers develop encryption algorithms more efficient to protect the encrypted information from an attack by cryptanalysis. This is the case of the Advanced Encryption Standard (AES). This block cipher algorithm was designed by Joan Daemen and Vincent Rijmen and transformed into standard by the National Institute of Standards and Technology (NIST) in 2001. To counter the usual methods of cryptanalysis of AES designers have given it a strong algebraic structure.This choice eliminates brilliantly any possibility of statistical attack, however, recent work suggests that what is supposed to be the strength of the AES, could prove to be his weak point. According to these studies, the AES cryptanalysis comes down to ``solve'' a quadratic equations symbolizing the structure of the AES encryption. Unfortunately, the size of the system of equations obtained and the lack of efficient resolution algorithms make it impossible, at this time, to solve such systems in a reasonable time.The challenge of this thesis is, from the algebraic structure of the AES, to describe its encryption and decryption processes in the form of a new Boolean equations system. Then, based on a specific representation of these equations, to achieve a combinatorial analysis to detect potential statistical biases
Shah, Milap. "Parallel Aes diffusion inter block diffusion at bit level and compression". Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42449.
Pełny tekst źródłaDidjurgis, Marius. "Duomenų apsaugos metodų tyrimas". Master's thesis, Lithuanian Academic Libraries Network (LABT), 2010. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20100826_110944-00030.
Pełny tekst źródłaData protection problem is relevant in now days living. This paper takes a review of the existing methods and programs in digital data cryptography. Also it explains AES (advanced encryption standard) method, the most trustful one and overviews software tool, that was coded and used in experiments analysing this algorithm. The new AES class, that was created in this project, is compared using few parameters with the older one, created by Microsoft. Despite the only purpose, to create a better program, the older implemented AES cipher class and it’s methods beats the new one.
Odelberg, David, i Carl Rasmus Holm. "Distributed cipher chaining for increased security in password storage". Thesis, Linköpings universitet, Datorteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-107484.
Pełny tekst źródłaShvartsman, Phillip. "Side-Channel-Attack Resistant AES Design Based on Finite Field Construction Variation". The Ohio State University, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=osu1555438117106036.
Pełny tekst źródłaKsiążki na temat "AES CRYPTOGRAPHY"
Sokolov, Artem, i Oleg Zhdanov. Cryptographic constructions on the basis of functions of multivalued logic. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1045434.
Pełny tekst źródłaTaĭnopisʹ v risunkakh A.S. Pushkina: Razgadka koda genii︠a︡. Moskva: Pokolenie, 2007.
Znajdź pełny tekst źródłaMaksurov, Aleksey. Ensuring information security on the Internet. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.
Pełny tekst źródłaAlta.) WIN (Conference) (2nd 2011 Banff. Women in Numbers 2: Research directions in number theory : BIRS Workshop, WIN2 - Women in Numbers 2, November 6-11, 2011, Banff International Research Station, Banff, Alberta, Canada. Redaktorzy David Chantal 1964-, Lalín Matilde 1977- i Manes Michelle 1970-. Providence, Rhode Island: American Mathematical Society, 2013.
Znajdź pełny tekst źródłaThe Design of Rijndael: AES - The Advanced Encryption Standard (Information Security and Cryptography). Springer, 2002.
Znajdź pełny tekst źródłaMartin, Keith M. Cryptographic Applications. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0012.
Pełny tekst źródłaMartin, Keith M. Control of Cryptography. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0014.
Pełny tekst źródłaMartin, Keith M. Basic Principles. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0001.
Pełny tekst źródłaMartin, Keith. Everyday Cryptography. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.001.0001.
Pełny tekst źródłaBos, Joppe, i Martijn Stam, red. Computational Cryptography. Cambridge University Press, 2021. http://dx.doi.org/10.1017/9781108854207.
Pełny tekst źródłaCzęści książek na temat "AES CRYPTOGRAPHY"
Buchmann, Johannes A. "AES". W Introduction to Cryptography, 139–49. New York, NY: Springer New York, 2004. http://dx.doi.org/10.1007/978-1-4419-9003-7_6.
Pełny tekst źródłaKnudsen, Lars R., i Matthew J. B. Robshaw. "AES". W Information Security and Cryptography, 35–64. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-17342-4_3.
Pełny tekst źródłaNikolić, Ivica. "Tweaking AES". W Selected Areas in Cryptography, 198–210. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19574-7_14.
Pełny tekst źródłaRobertazzi, Thomas G. "AES and Quantum Cryptography". W Introduction to Computer Networking, 129–40. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-53103-8_11.
Pełny tekst źródłaPaar, Christof, i Jan Pelzl. "The Advanced Encryption Standard (AES)". W Understanding Cryptography, 87–121. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-04101-3_4.
Pełny tekst źródłaDamgård, Ivan, i Marcel Keller. "Secure Multiparty AES". W Financial Cryptography and Data Security, 367–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14577-3_31.
Pełny tekst źródłaCanright, David, i Dag Arne Osvik. "A More Compact AES". W Selected Areas in Cryptography, 157–69. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05445-7_10.
Pełny tekst źródłaBlömer, Johannes, Jorge Guajardo i Volker Krummel. "Provably Secure Masking of AES". W Selected Areas in Cryptography, 69–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30564-4_5.
Pełny tekst źródłaGrassi, Lorenzo, Gregor Leander, Christian Rechberger, Cihangir Tezcan i Friedrich Wiemer. "Weak-Key Distinguishers for AES". W Selected Areas in Cryptography, 141–70. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81652-0_6.
Pełny tekst źródłaBertoni, Guido M., Lorenzo Grassi i Filippo Melzani. "Simulations of Optical Emissions for Attacking AES and Masked AES". W Security, Privacy, and Applied Cryptography Engineering, 172–89. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24126-5_11.
Pełny tekst źródłaStreszczenia konferencji na temat "AES CRYPTOGRAPHY"
Alaoui-Ismaili, Z., A. Moussa, A. El Mourabit i K. Amechnoue. "Flexible hardware architecture for AES cryptography algorithm". W 2009 International Conference on Multimedia Computing and Systems (ICMCS). IEEE, 2009. http://dx.doi.org/10.1109/mmcs.2009.5256655.
Pełny tekst źródłaRad, Nima Behnood, i Hamed Shah-Hosseini. "GBHE: Grid-Based Cryptography with AES Algorithm". W 2008 International Conference on Computer and Electrical Engineering (ICCEE). IEEE, 2008. http://dx.doi.org/10.1109/iccee.2008.36.
Pełny tekst źródłaGupta, Aryansh, Anwar Ali, Aditya Kumar Pandey, Ankit Kumar Gupta i Abhinandan Tripathi. "Metamorphic Cryptography Using AES and LSB Method". W 2022 International Conference on Advances in Computing, Communication and Materials (ICACCM). IEEE, 2022. http://dx.doi.org/10.1109/icaccm56405.2022.10009381.
Pełny tekst źródłaChen, Chin-Sheng, Siang-Yu Chiu i Shih-Yu Li. "AES Encryption Method Based on Chaotic Cryptography". W 2023 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan). IEEE, 2023. http://dx.doi.org/10.1109/icce-taiwan58799.2023.10226728.
Pełny tekst źródłaFloissac, Noemie, i Yann L'Hyver. "From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks on Key Expansion". W 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE, 2011. http://dx.doi.org/10.1109/fdtc.2011.15.
Pełny tekst źródłaKim, Chong Hee. "Differential Fault Analysis against AES-192 and AES-256 with Minimal Faults". W 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE, 2010. http://dx.doi.org/10.1109/fdtc.2010.10.
Pełny tekst źródła"Improved “Partial Sums”-based Square Attack on AES". W International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2012. http://dx.doi.org/10.5220/0003990300250034.
Pełny tekst źródłaIrmanova, Aidana, i Martin Lukac. "AES 128 Encrypted Image Classification". W 2023 7th International Conference on Cryptography, Security and Privacy (CSP). IEEE, 2023. http://dx.doi.org/10.1109/csp58884.2023.00038.
Pełny tekst źródłaRane, Toshna, Shreya Godbole, Parth Gujar, Harshal More i Pravin Adivarekar. "Securing Images with AES and Visual Cryptography Techniques". W 2023 4th International Conference for Emerging Technology (INCET). IEEE, 2023. http://dx.doi.org/10.1109/incet57972.2023.10170070.
Pełny tekst źródłaBettale, Luk, Emmanuelle Dottax i Mailody Ramphort. "Algebraic Side-Channel Attacks on Masked Implementations of AES". W International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2018. http://dx.doi.org/10.5220/0006869502580269.
Pełny tekst źródłaRaporty organizacyjne na temat "AES CRYPTOGRAPHY"
McGrew, D., D. Bailey, M. Campagna i R. Dugal. AES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites for TLS. RFC Editor, czerwiec 2014. http://dx.doi.org/10.17487/rfc7251.
Pełny tekst źródłaMouha, Nicky. Review of the Advanced Encryption Standard. National Institute of Standards and Technology, lipiec 2021. http://dx.doi.org/10.6028/nist.ir.8319.
Pełny tekst źródłade Abreu, Jonas, i Mariana Cunha e Melo. Extending Pix: An approach to offline Dynamic QR Code generation. Center for Technology and Public Interest, SL, kwiecień 2023. http://dx.doi.org/10.59262/9qu6ex.
Pełny tekst źródłaHousley, R. Using AES-CCM and AES-GCM Authenticated Encryption in the Cryptographic Message Syntax (CMS). RFC Editor, listopad 2007. http://dx.doi.org/10.17487/rfc5084.
Pełny tekst źródłaHousley, R. Using the AES-GMAC Algorithm with the Cryptographic Message Syntax (CMS). RFC Editor, czerwiec 2021. http://dx.doi.org/10.17487/rfc9044.
Pełny tekst źródłaTaiber, Joachim. Unsettled Topics Concerning the Impact of Quantum Technologies on Automotive Cybersecurity. SAE International, grudzień 2020. http://dx.doi.org/10.4271/epr2020026.
Pełny tekst źródłaSchaad, J. Use of the Advanced Encryption Standard (AES) Encryption Algorithm in Cryptographic Message Syntax (CMS). RFC Editor, lipiec 2003. http://dx.doi.org/10.17487/rfc3565.
Pełny tekst źródłaDolotii, Marharyta H., i Pavlo V. Merzlykin. Using the random number generator with a hardware entropy source for symmetric cryptography problems. [б. в.], grudzień 2018. http://dx.doi.org/10.31812/123456789/2883.
Pełny tekst źródłaIorga, Michaela, i Carroll Brickenkamp. National Voluntary Laboratory Accreditation Program (NVLAP) cryptographic and security testing. Gaithersburg, MD: National Institute of Standards and Technology (U.S.), czerwiec 2008. http://dx.doi.org/10.6028/nist.hb.150-17e2008.
Pełny tekst źródłaAllende López, Marcos, Diego López, Sergio Cerón, Antonio Leal, Adrián Pareja, Marcelo Da Silva, Alejandro Pardo i in. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, czerwiec 2021. http://dx.doi.org/10.18235/0003313.
Pełny tekst źródła