Artykuły w czasopismach na temat „AES CRYPTOGRAPHY”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „AES CRYPTOGRAPHY”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Yang, Huiwei. "Application of Hybrid Encryption Algorithm in Hardware Encryption Interface Card". Security and Communication Networks 2022 (30.05.2022): 1–11. http://dx.doi.org/10.1155/2022/7794209.
Pełny tekst źródłaRaut, Kinjal. "A Comprehensive Review of Cryptographic Algorithms". International Journal for Research in Applied Science and Engineering Technology 9, nr 12 (31.12.2021): 1750–56. http://dx.doi.org/10.22214/ijraset.2021.39581.
Pełny tekst źródłaWang, Xing, Qiang Zhang i Xiao Peng Wei. "A New Encryption Method Based on Rijndael Algorithm and DNA Computing". Applied Mechanics and Materials 20-23 (styczeń 2010): 1241–46. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1241.
Pełny tekst źródłaDhansukhbhai Patel, Dr Dipakkumar, i Dr Subhashchandra Desai. "Securing textual information with an image in the image using a visual cryptography AES algorithm." International Journal of Enhanced Research in Management & Computer Applications 12, nr 06 (2023): 75–90. http://dx.doi.org/10.55948/ijermca.2023.0611.
Pełny tekst źródłaAhamad, Md Martuza, i Md Ibrahim Abdullah. "Comparison of Encryption Algorithms for Multimedia". Rajshahi University Journal of Science and Engineering 44 (19.11.2016): 131–39. http://dx.doi.org/10.3329/rujse.v44i0.30398.
Pełny tekst źródłaSingh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications". Mathematical Statistician and Engineering Applications 70, nr 1 (31.01.2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.
Pełny tekst źródłaB S, Aditya, i Sharadadevi Kaganurmath. "Use of Cryptography and Signing for Network Security". International Journal for Research in Applied Science and Engineering Technology 10, nr 7 (31.07.2022): 4080–83. http://dx.doi.org/10.22214/ijraset.2022.45926.
Pełny tekst źródłaArifianto, Sofyan, Shinta Permatasari i Aminudin Aminudin. "Modifikasi enkripsi dan dekripsi AES menggunakan polybius chiper dalam pengamanan data". Jurnal Repositor 1, nr 2 (31.12.2019): 117. http://dx.doi.org/10.22219/repositor.v1i2.808.
Pełny tekst źródłaKurbet, ejashwini C., i Jenitta J. "NANO-AES Security Algorithm for Image Cryptography". International Journal for Research in Applied Science and Engineering Technology 11, nr 8 (31.08.2023): 742–46. http://dx.doi.org/10.22214/ijraset.2023.55238.
Pełny tekst źródłaTahir, Ari Shawkat. "A Modified Advanced Encryption Standard Algorithm for Image Encryption". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, nr 11 (14.08.2015): 6258–67. http://dx.doi.org/10.24297/ijct.v14i11.1811.
Pełny tekst źródłaShah, Aayush, Prabhat Mahato i Aadarsh Bhagat. "Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm". International Journal for Research in Applied Science and Engineering Technology 11, nr 8 (31.08.2023): 1626–42. http://dx.doi.org/10.22214/ijraset.2023.55341.
Pełny tekst źródłaSatapure, Pratiksha. "Different Methods of Encryption and Decryption". International Journal for Research in Applied Science and Engineering Technology 9, nr 11 (30.11.2021): 170–77. http://dx.doi.org/10.22214/ijraset.2021.38732.
Pełny tekst źródłaMustika, Laila. "Implementasi Algoritma AES Untuk Pengamanan Login Dan Data Customer Pada E-Commerce Berbasis Web". JURIKOM (Jurnal Riset Komputer) 7, nr 1 (15.02.2020): 148. http://dx.doi.org/10.30865/jurikom.v7i1.1943.
Pełny tekst źródłaVerma, Rohit, i Aman Kumar Sharma. "Cryptography: Avalanche effect of AES and RSA". International Journal of Scientific and Research Publications (IJSRP) 10, nr 4 (6.04.2020): p10013. http://dx.doi.org/10.29322/ijsrp.10.04.2020.p10013.
Pełny tekst źródłaAllakany, Alaa, Abeer Saber, Samih M. Mostafa, Maazen Alsabaan, Mohamed I. Ibrahem i Haitham Elwahsh. "Enhancing Security in ZigBee Wireless Sensor Networks: A New Approach and Mutual Authentication Scheme for D2D Communication". Sensors 23, nr 12 (19.06.2023): 5703. http://dx.doi.org/10.3390/s23125703.
Pełny tekst źródłaSweatha, A. Anjalin, i K. Mohaideen Pitchai. "Construction of Cryptographically Secure AES S-Box using Second-order Reversible Cellular Automata". Journal of Intelligent & Fuzzy Systems 39, nr 3 (7.10.2020): 4313–18. http://dx.doi.org/10.3233/jifs-200326.
Pełny tekst źródłaO. O, Rejuaro, Adetunji A. B., Adedeji F., Falohun A. S., Iromini N. A. i Adebajo O. O. "Development of an Improved Access Control System using an Enhanced Bimodal Crypto-Biometric System". International Journal for Research in Applied Science and Engineering Technology 11, nr 5 (31.05.2023): 752–68. http://dx.doi.org/10.22214/ijraset.2023.49548.
Pełny tekst źródłaOlaniyan, Olatayo Moses, Ayobami Taiwo Olusesi, Bolaji Abigail Omodunbi, Wajeed Bolanle Wahab, Olusogo Julius Adetunji i Bamidele Musiliu Olukoya. "A Data Security Model for Mobile Ad Hoc Network Using Linear Function Mayfly Advanced Encryption Standard". International Journal of Emerging Technology and Advanced Engineering 13, nr 3 (1.03.2023): 101–10. http://dx.doi.org/10.46338/ijetae0323_10.
Pełny tekst źródłaMohammad, Hussein M., i Alharith A. Abdullah. "Enhancement process of AES: a lightweight cryptography algorithm-AES for constrained devices". TELKOMNIKA (Telecommunication Computing Electronics and Control) 20, nr 3 (1.06.2022): 551. http://dx.doi.org/10.12928/telkomnika.v20i3.23297.
Pełny tekst źródłaEt. al., Arsha Kolate,. "An Information Security Using DNA Cryptography along with AES Algorithm". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, nr 1S (11.04.2021): 183–92. http://dx.doi.org/10.17762/turcomat.v12i1s.1607.
Pełny tekst źródłaYan, Tian Yun, Kai Kuo Xu, Min Wei i Jia He. "Studies on Security Communications of Embedded Devices". Advanced Materials Research 216 (marzec 2011): 609–12. http://dx.doi.org/10.4028/www.scientific.net/amr.216.609.
Pełny tekst źródłaT, Ramya, Ramya G, Karthik Raju, Ravi J i Deepak Verma. "An Efficient AES Algorithm for Cryptography Using VLSI". ECS Transactions 107, nr 1 (24.04.2022): 5605–12. http://dx.doi.org/10.1149/10701.5605ecst.
Pełny tekst źródłaVijayarajan, R., P. Gnanasivam i R. Avudaiammal. "Bio-Key Based AES for Personalized Image Cryptography". Computer Journal 62, nr 11 (10.04.2019): 1695–705. http://dx.doi.org/10.1093/comjnl/bxz030.
Pełny tekst źródłaSingh, Pankaj, i Sachin Kumar. "Study & analysis of cryptography algorithms : RSA, AES, DES, T-DES, blowfish". International Journal of Engineering & Technology 7, nr 1.5 (31.12.2017): 221. http://dx.doi.org/10.14419/ijet.v7i1.5.9150.
Pełny tekst źródłaSinghal, Yash, Adwit Agarwal, Shivank Mittal, Shristi Katyayani i Amit Sharma. "Database Security using Cryptography". International Journal for Research in Applied Science and Engineering Technology 10, nr 6 (30.06.2022): 582–87. http://dx.doi.org/10.22214/ijraset.2022.43621.
Pełny tekst źródłaTabeidi, Rania A., i Samia M. Masaad. "Survey and Analysis of the Evolution of Wireless Security in IEEE 802.11 Standards using Advanced Encryption Standard (AES)". Circulation in Computer Science 2, nr 10 (20.11.2017): 1–7. http://dx.doi.org/10.22632/ccs-2017-252-01.
Pełny tekst źródłaChang, Lipeng, Yuechuan Wei, Xiangru Wang i Xiaozhong Pan. "Collision Forgery Attack on the AES-OTR Algorithm under Quantum Computing". Symmetry 14, nr 7 (13.07.2022): 1434. http://dx.doi.org/10.3390/sym14071434.
Pełny tekst źródłaBagul, Riya, Atharva Karaguppi, Vishwas Karale, Mudit Singal i Dr Vaishali Ingale. "A Dynamic and Highly Configurable Crypto-Processor for brief communication interval". Journal of University of Shanghai for Science and Technology 23, nr 05 (25.05.2021): 551–61. http://dx.doi.org/10.51201/jusst/21/05162.
Pełny tekst źródłaChowdhary, Chiranji Lal, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan Perumal i Muhammad Fazal Ijaz. "Analytical Study of Hybrid Techniques for Image Encryption and Decryption". Sensors 20, nr 18 (10.09.2020): 5162. http://dx.doi.org/10.3390/s20185162.
Pełny tekst źródłaShukla, Piyush Kumar, Amer Aljaedi, Piyush Kumar Pareek, Adel R. Alharbi i Sajjad Shaukat Jamal. "AES Based White Box Cryptography in Digital Signature Verification". Sensors 22, nr 23 (2.12.2022): 9444. http://dx.doi.org/10.3390/s22239444.
Pełny tekst źródłaLi, Juan. "A Symmetric Cryptography Algorithm in Wireless Sensor Network Security". International Journal of Online Engineering (iJOE) 13, nr 11 (22.11.2017): 102. http://dx.doi.org/10.3991/ijoe.v13i11.7752.
Pełny tekst źródłaOukili, Soufiane, i Seddik Bri. "Hardware Implementation of AES Algorithm with Logic S-box". Journal of Circuits, Systems and Computers 26, nr 09 (24.04.2017): 1750141. http://dx.doi.org/10.1142/s0218126617501419.
Pełny tekst źródłaEt. al., Pravin Soni,. "Performance Analysis of Cascaded Hybrid Symmetric Encryption Models". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, nr 2 (10.04.2021): 1699–708. http://dx.doi.org/10.17762/turcomat.v12i2.1506.
Pełny tekst źródłaAz, Maulyanda, Syafrial Fachri Pane i Rolly Maulana Awangga. "Cryptography: Cryptography: Perancangan Middleware Web Service Encryptor menggunakan Triple Key MD5. Base64, dan AES". Jurnal Tekno Insentif 15, nr 2 (31.10.2021): 65–75. http://dx.doi.org/10.36787/jti.v15i1.497.
Pełny tekst źródłaGayathri, P., Syed Umar, G. Sridevi, N. Bashwanth i Royyuru Srikanth. "Hybrid Cryptography for Random-key Generation based on ECC Algorithm". International Journal of Electrical and Computer Engineering (IJECE) 7, nr 3 (1.06.2017): 1293. http://dx.doi.org/10.11591/ijece.v7i3.pp1293-1298.
Pełny tekst źródłaKumar, Thanikodi Manoj, Kasarla Satish Reddy, Stefano Rinaldi, Bidare Divakarachari Parameshachari i Kavitha Arunachalam. "A Low Area High Speed FPGA Implementation of AES Architecture for Cryptography Application". Electronics 10, nr 16 (21.08.2021): 2023. http://dx.doi.org/10.3390/electronics10162023.
Pełny tekst źródłaM, Santhanalakshmi, Ms Lakshana K i Ms Shahitya G M. "Enhanced AES-256 cipher round algorithm for IoT applications". Scientific Temper 14, nr 01 (25.03.2023): 184–90. http://dx.doi.org/10.58414/scientifictemper.2023.14.1.22.
Pełny tekst źródłaFazila, S., B. Reddaiah, S. Sai Ramya, B. J. Karuna Sagar i C. Swetha. "Enhancing AES with Key Dependent S-Box and Transpose MDS Matrix". International Journal of Innovative Technology and Exploring Engineering 11, nr 9 (30.08.2022): 61–66. http://dx.doi.org/10.35940/ijitee.g9245.0811922.
Pełny tekst źródłaG. Chaloop, Samir, i Mahmood Z. Abdullah. "ENHANCING HYBRID SECURITY APPROACH USING AES AND RSA ALGORITHMS". Journal of Engineering and Sustainable Development 25, nr 4 (1.07.2021): 58–66. http://dx.doi.org/10.31272/jeasd.25.4.6.
Pełny tekst źródłaPyrkova, A. YU, i ZH E. Temirbekova. "Compare encryption performance across devices to ensure the security of the IOT". Indonesian Journal of Electrical Engineering and Computer Science 20, nr 2 (1.11.2020): 894. http://dx.doi.org/10.11591/ijeecs.v20.i2.pp894-902.
Pełny tekst źródłaSingh, Amritpal, Mohit Marwaha, Baljinder Singh i Sandeep Singh. "Comparative Study of DES, 3DES, AES and RSA". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 9, nr 3 (21.07.2013): 1162–70. http://dx.doi.org/10.24297/ijct.v9i3.3342.
Pełny tekst źródłaNurnaningsih, Desi, i Angga Aditya Permana. "RANCANGAN APLIKASI PENGAMANAN DATA DENGAN ALGORITMA ADVANCED ENCYPTION STANDARD (AES)". JURNAL TEKNIK INFORMATIKA 11, nr 2 (28.11.2018): 177–86. http://dx.doi.org/10.15408/jti.v11i2.7811.
Pełny tekst źródłaTaufiqqurrachman, Taufiqurrachman, i Dani Elsandi. "Security Analysis and Encryption Time Comparison Description on Cryptography Advanced Encryption Standard (AES)". Jurnal Inovatif : Inovasi Teknologi Informasi dan Informatika 5, nr 1 (1.07.2022): 60. http://dx.doi.org/10.32832/inova-tif.v5i1.8345.
Pełny tekst źródłaP, Varsha, i Dr V. Nanammal. "Image Cryptography Design Based on Nano AES Security Algorithm". International Journal for Research in Applied Science and Engineering Technology 10, nr 9 (30.09.2022): 590–93. http://dx.doi.org/10.22214/ijraset.2022.46613.
Pełny tekst źródłaFei, Xiongwei, Kenli Li i Wangdong Yang. "A fast parallel cryptography algorithm based on AES-NI". Journal of Intelligent & Fuzzy Systems 31, nr 2 (22.07.2016): 1099–107. http://dx.doi.org/10.3233/jifs-169039.
Pełny tekst źródłaAdlani, M. Adharis, i Ricky Eka Putra. "Pengamanan Mnemonic Phrase Menggunakan Modified Advanced Encryption Standart". Journal of Informatics and Computer Science (JINACS) 3, nr 04 (10.06.2022): 425–34. http://dx.doi.org/10.26740/jinacs.v3n04.p425-434.
Pełny tekst źródłaMohamad, Rafidah. "Data hiding by using AES Algorithm". Wasit Journal of Computer and Mathematics Science 1, nr 4 (31.12.2022): 112–19. http://dx.doi.org/10.31185/wjcm.82.
Pełny tekst źródłaKulkarni, Utkarsha, Rosemeen Mansuri i Riya Adikane. "File Storage on Cloud Using Cryptography". International Journal for Research in Applied Science and Engineering Technology 10, nr 5 (31.05.2022): 1950–53. http://dx.doi.org/10.22214/ijraset.2022.42652.
Pełny tekst źródłaSivamurugan, D., i L. Raja. "SECURE ROUTING IN MANET USING HYBRID CRYPTOGRAPHY". International Journal of Research -GRANTHAALAYAH 5, nr 4 (30.04.2017): 83–91. http://dx.doi.org/10.29121/granthaalayah.v5.i4.2017.1798.
Pełny tekst źródłaIftikhar, U., K. Asrar, M. Waqas i S. A. Ali. "Evaluating the Performance Parameters of Cryptographic Algorithms for IOT-based Devices". Engineering, Technology & Applied Science Research 11, nr 6 (11.12.2021): 7867–74. http://dx.doi.org/10.48084/etasr.4263.
Pełny tekst źródła