Добірка наукової літератури з теми "AES CRYPTOGRAPHY"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "AES CRYPTOGRAPHY".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "AES CRYPTOGRAPHY"
Yang, Huiwei. "Application of Hybrid Encryption Algorithm in Hardware Encryption Interface Card." Security and Communication Networks 2022 (May 30, 2022): 1–11. http://dx.doi.org/10.1155/2022/7794209.
Повний текст джерелаRaut, Kinjal. "A Comprehensive Review of Cryptographic Algorithms." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (December 31, 2021): 1750–56. http://dx.doi.org/10.22214/ijraset.2021.39581.
Повний текст джерелаWang, Xing, Qiang Zhang, and Xiao Peng Wei. "A New Encryption Method Based on Rijndael Algorithm and DNA Computing." Applied Mechanics and Materials 20-23 (January 2010): 1241–46. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1241.
Повний текст джерелаDhansukhbhai Patel, Dr Dipakkumar, and Dr Subhashchandra Desai. "Securing textual information with an image in the image using a visual cryptography AES algorithm." International Journal of Enhanced Research in Management & Computer Applications 12, no. 06 (2023): 75–90. http://dx.doi.org/10.55948/ijermca.2023.0611.
Повний текст джерелаAhamad, Md Martuza, and Md Ibrahim Abdullah. "Comparison of Encryption Algorithms for Multimedia." Rajshahi University Journal of Science and Engineering 44 (November 19, 2016): 131–39. http://dx.doi.org/10.3329/rujse.v44i0.30398.
Повний текст джерелаSingh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications." Mathematical Statistician and Engineering Applications 70, no. 1 (January 31, 2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.
Повний текст джерелаB S, Aditya, and Sharadadevi Kaganurmath. "Use of Cryptography and Signing for Network Security." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (July 31, 2022): 4080–83. http://dx.doi.org/10.22214/ijraset.2022.45926.
Повний текст джерелаArifianto, Sofyan, Shinta Permatasari, and Aminudin Aminudin. "Modifikasi enkripsi dan dekripsi AES menggunakan polybius chiper dalam pengamanan data." Jurnal Repositor 1, no. 2 (December 31, 2019): 117. http://dx.doi.org/10.22219/repositor.v1i2.808.
Повний текст джерелаKurbet, ejashwini C., and Jenitta J. "NANO-AES Security Algorithm for Image Cryptography." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (August 31, 2023): 742–46. http://dx.doi.org/10.22214/ijraset.2023.55238.
Повний текст джерелаTahir, Ari Shawkat. "A Modified Advanced Encryption Standard Algorithm for Image Encryption." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 11 (August 14, 2015): 6258–67. http://dx.doi.org/10.24297/ijct.v14i11.1811.
Повний текст джерелаДисертації з теми "AES CRYPTOGRAPHY"
Islam, Naveed. "Cryptography based Visual Data Protection." Thesis, Montpellier 2, 2011. http://www.theses.fr/2011MON20178/document.
Повний текст джерелаDue to the advancements in the information and communication technologies, the transmission of multimedia data over secure or insecure communication channels has increased exponentially. The security of data in applications like safe storage, authentications, copyright protection,remote military image communication or confidential video-conferencing require new strategies for secure transmission. Two techniques are commonly used for the secure transmission of visual data, i.e. cryptography and steganography. Cryptography achieves security by using secret keysto make the data illegible while steganography aims to hide the data in some innocent carrier signal. For shared trust and distributed environment, secret sharing schemes provide sufficient security in various communication applications. The principal objective of this thesis is to achieveprotection of visual data especially images through modern cryptographic techniques. In this context, the focus of the work in perspective, is twofolded. The first part of our work focuses on the security of image data in shared environment while the second part focuses on the integrity ofimage data in the encrypted domain during transmission.We proposed a new sharing scheme for images which exploits the additive and multiplicative homomorphic properties of two well known public key cryptosystems, namely, the RSA and the Paillier. In traditional secret sharing schemes, the dealer partitions the secret into shares and distributethe shares to each of the player. Thus, none of the involved players participate in the creation of the shared secret and there is always a possibilitythat the dealer can cheat some player. On the contrary, the proposed approach employs the secret sharing scheme in a way that limits the influence of the dealer over the protocol by allowing each player to participate. The second part of our thesis emphasizes on the integrity of visual data during transmission. Data integrity means that the data have its complete structure during any operation like storage, transfer or retrieval. A single bit change in encrypted data can have catastrophic impact over the decrypted data. We address the problem of error correction in images encrypted using symmetric key cryptosystem of the Advanced Encryption Standard (AES) algorithm. Three methods are proposed to exploit the local statistics of the visual data and the encryption algorithm to successfully correct the errors
Jean, Jérémy. "Cryptanalyse de primitives symétriques basées sur le chiffrement AES." Phd thesis, Ecole Normale Supérieure de Paris - ENS Paris, 2013. http://tel.archives-ouvertes.fr/tel-00911049.
Повний текст джерелаMantzouris, Panteleimon. "Computational algebraic attacks on the Advanced Encryption Standard (AES)." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FMantzouris.pdf.
Повний текст джерелаThesis Advisor(s): Canright, David ; Butler, Jon. "September 2009." Description based on title screen as viewed on 5 November 2009. Author(s) subject terms: Advanced Encryption Standard (AES), Rijndael's algorithm, block cipher, decipher, round of the algorithm, sparse multivariate polynomial. Includes bibliographical references (p. 101). Also available in print.
Song, Beomsik. "Observations on the cryptologic properties of the AES algorithm." Access electronically, 2004. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20041028.102719/index.html.
Повний текст джерелаTaha, Mostafa Mohamed Ibrahim. "Advances in the Side-Channel Analysis of Symmetric Cryptography." Diss., Virginia Tech, 2014. http://hdl.handle.net/10919/79559.
Повний текст джерелаPh. D.
Dubois, Michel. "Conception, développement et analyse de systèmes de fonction booléennes décrivant les algorithmes de chiffrement et de déchiffrement de l'Advanced Encryption Standard." Thesis, Paris, ENSAM, 2017. http://www.theses.fr/2017ENAM0024/document.
Повний текст джерелаCryptology is one of the mathematical fields, it is composed of two subsets: cryptography and cryptanalysis. While cryptography focuses on algorithms to modify an information by making it unintelligible without knowledge of a secret, the second focuses on mathematical methods to recover the original information from the only knowledge of the encrypted element.Cryptography itself is subdivided into two subsets: symmetric cryptography and asymmetric cryptography. The first uses the same key for encryption and decryption operations, while the second uses one key for encryption and another key, different from the previous one, for decryption. Finally, symmetric cryptography is working either on blocks of information either on continuous flow of information. These are algorithms block cipher that interests us here.The aim of cryptanalysis is to recover the original information without knowing the encryption key and this, into a shorter time than the brute-force attack. There are many methods of cryptanalysis as frequency cryptanalysis, differential cryptanalysis, integral cryptanalysis, linear cryptanalysis...Many of these methods are defeated by modern encryption algorithms. Indeed, in a game of spear and shield, cryptographers develop encryption algorithms more efficient to protect the encrypted information from an attack by cryptanalysis. This is the case of the Advanced Encryption Standard (AES). This block cipher algorithm was designed by Joan Daemen and Vincent Rijmen and transformed into standard by the National Institute of Standards and Technology (NIST) in 2001. To counter the usual methods of cryptanalysis of AES designers have given it a strong algebraic structure.This choice eliminates brilliantly any possibility of statistical attack, however, recent work suggests that what is supposed to be the strength of the AES, could prove to be his weak point. According to these studies, the AES cryptanalysis comes down to ``solve'' a quadratic equations symbolizing the structure of the AES encryption. Unfortunately, the size of the system of equations obtained and the lack of efficient resolution algorithms make it impossible, at this time, to solve such systems in a reasonable time.The challenge of this thesis is, from the algebraic structure of the AES, to describe its encryption and decryption processes in the form of a new Boolean equations system. Then, based on a specific representation of these equations, to achieve a combinatorial analysis to detect potential statistical biases
Shah, Milap. "Parallel Aes diffusion inter block diffusion at bit level and compression." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42449.
Повний текст джерелаDidjurgis, Marius. "Duomenų apsaugos metodų tyrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2010. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20100826_110944-00030.
Повний текст джерелаData protection problem is relevant in now days living. This paper takes a review of the existing methods and programs in digital data cryptography. Also it explains AES (advanced encryption standard) method, the most trustful one and overviews software tool, that was coded and used in experiments analysing this algorithm. The new AES class, that was created in this project, is compared using few parameters with the older one, created by Microsoft. Despite the only purpose, to create a better program, the older implemented AES cipher class and it’s methods beats the new one.
Odelberg, David, and Carl Rasmus Holm. "Distributed cipher chaining for increased security in password storage." Thesis, Linköpings universitet, Datorteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-107484.
Повний текст джерелаShvartsman, Phillip. "Side-Channel-Attack Resistant AES Design Based on Finite Field Construction Variation." The Ohio State University, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=osu1555438117106036.
Повний текст джерелаКниги з теми "AES CRYPTOGRAPHY"
Sokolov, Artem, and Oleg Zhdanov. Cryptographic constructions on the basis of functions of multivalued logic. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1045434.
Повний текст джерелаTaĭnopisʹ v risunkakh A.S. Pushkina: Razgadka koda genii︠a︡. Moskva: Pokolenie, 2007.
Знайти повний текст джерелаMaksurov, Aleksey. Ensuring information security on the Internet. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.
Повний текст джерелаAlta.) WIN (Conference) (2nd 2011 Banff. Women in Numbers 2: Research directions in number theory : BIRS Workshop, WIN2 - Women in Numbers 2, November 6-11, 2011, Banff International Research Station, Banff, Alberta, Canada. Edited by David Chantal 1964-, Lalín Matilde 1977-, and Manes Michelle 1970-. Providence, Rhode Island: American Mathematical Society, 2013.
Знайти повний текст джерелаThe Design of Rijndael: AES - The Advanced Encryption Standard (Information Security and Cryptography). Springer, 2002.
Знайти повний текст джерелаMartin, Keith M. Cryptographic Applications. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0012.
Повний текст джерелаMartin, Keith M. Control of Cryptography. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0014.
Повний текст джерелаMartin, Keith M. Basic Principles. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0001.
Повний текст джерелаMartin, Keith. Everyday Cryptography. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.001.0001.
Повний текст джерелаBos, Joppe, and Martijn Stam, eds. Computational Cryptography. Cambridge University Press, 2021. http://dx.doi.org/10.1017/9781108854207.
Повний текст джерелаЧастини книг з теми "AES CRYPTOGRAPHY"
Buchmann, Johannes A. "AES." In Introduction to Cryptography, 139–49. New York, NY: Springer New York, 2004. http://dx.doi.org/10.1007/978-1-4419-9003-7_6.
Повний текст джерелаKnudsen, Lars R., and Matthew J. B. Robshaw. "AES." In Information Security and Cryptography, 35–64. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-17342-4_3.
Повний текст джерелаNikolić, Ivica. "Tweaking AES." In Selected Areas in Cryptography, 198–210. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19574-7_14.
Повний текст джерелаRobertazzi, Thomas G. "AES and Quantum Cryptography." In Introduction to Computer Networking, 129–40. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-53103-8_11.
Повний текст джерелаPaar, Christof, and Jan Pelzl. "The Advanced Encryption Standard (AES)." In Understanding Cryptography, 87–121. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-04101-3_4.
Повний текст джерелаDamgård, Ivan, and Marcel Keller. "Secure Multiparty AES." In Financial Cryptography and Data Security, 367–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14577-3_31.
Повний текст джерелаCanright, David, and Dag Arne Osvik. "A More Compact AES." In Selected Areas in Cryptography, 157–69. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05445-7_10.
Повний текст джерелаBlömer, Johannes, Jorge Guajardo, and Volker Krummel. "Provably Secure Masking of AES." In Selected Areas in Cryptography, 69–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30564-4_5.
Повний текст джерелаGrassi, Lorenzo, Gregor Leander, Christian Rechberger, Cihangir Tezcan, and Friedrich Wiemer. "Weak-Key Distinguishers for AES." In Selected Areas in Cryptography, 141–70. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81652-0_6.
Повний текст джерелаBertoni, Guido M., Lorenzo Grassi, and Filippo Melzani. "Simulations of Optical Emissions for Attacking AES and Masked AES." In Security, Privacy, and Applied Cryptography Engineering, 172–89. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24126-5_11.
Повний текст джерелаТези доповідей конференцій з теми "AES CRYPTOGRAPHY"
Alaoui-Ismaili, Z., A. Moussa, A. El Mourabit, and K. Amechnoue. "Flexible hardware architecture for AES cryptography algorithm." In 2009 International Conference on Multimedia Computing and Systems (ICMCS). IEEE, 2009. http://dx.doi.org/10.1109/mmcs.2009.5256655.
Повний текст джерелаRad, Nima Behnood, and Hamed Shah-Hosseini. "GBHE: Grid-Based Cryptography with AES Algorithm." In 2008 International Conference on Computer and Electrical Engineering (ICCEE). IEEE, 2008. http://dx.doi.org/10.1109/iccee.2008.36.
Повний текст джерелаGupta, Aryansh, Anwar Ali, Aditya Kumar Pandey, Ankit Kumar Gupta, and Abhinandan Tripathi. "Metamorphic Cryptography Using AES and LSB Method." In 2022 International Conference on Advances in Computing, Communication and Materials (ICACCM). IEEE, 2022. http://dx.doi.org/10.1109/icaccm56405.2022.10009381.
Повний текст джерелаChen, Chin-Sheng, Siang-Yu Chiu, and Shih-Yu Li. "AES Encryption Method Based on Chaotic Cryptography." In 2023 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan). IEEE, 2023. http://dx.doi.org/10.1109/icce-taiwan58799.2023.10226728.
Повний текст джерелаFloissac, Noemie, and Yann L'Hyver. "From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks on Key Expansion." In 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE, 2011. http://dx.doi.org/10.1109/fdtc.2011.15.
Повний текст джерелаKim, Chong Hee. "Differential Fault Analysis against AES-192 and AES-256 with Minimal Faults." In 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE, 2010. http://dx.doi.org/10.1109/fdtc.2010.10.
Повний текст джерела"Improved “Partial Sums”-based Square Attack on AES." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2012. http://dx.doi.org/10.5220/0003990300250034.
Повний текст джерелаIrmanova, Aidana, and Martin Lukac. "AES 128 Encrypted Image Classification." In 2023 7th International Conference on Cryptography, Security and Privacy (CSP). IEEE, 2023. http://dx.doi.org/10.1109/csp58884.2023.00038.
Повний текст джерелаRane, Toshna, Shreya Godbole, Parth Gujar, Harshal More, and Pravin Adivarekar. "Securing Images with AES and Visual Cryptography Techniques." In 2023 4th International Conference for Emerging Technology (INCET). IEEE, 2023. http://dx.doi.org/10.1109/incet57972.2023.10170070.
Повний текст джерелаBettale, Luk, Emmanuelle Dottax, and Mailody Ramphort. "Algebraic Side-Channel Attacks on Masked Implementations of AES." In International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2018. http://dx.doi.org/10.5220/0006869502580269.
Повний текст джерелаЗвіти організацій з теми "AES CRYPTOGRAPHY"
McGrew, D., D. Bailey, M. Campagna, and R. Dugal. AES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites for TLS. RFC Editor, June 2014. http://dx.doi.org/10.17487/rfc7251.
Повний текст джерелаMouha, Nicky. Review of the Advanced Encryption Standard. National Institute of Standards and Technology, July 2021. http://dx.doi.org/10.6028/nist.ir.8319.
Повний текст джерелаde Abreu, Jonas, and Mariana Cunha e Melo. Extending Pix: An approach to offline Dynamic QR Code generation. Center for Technology and Public Interest, SL, April 2023. http://dx.doi.org/10.59262/9qu6ex.
Повний текст джерелаHousley, R. Using AES-CCM and AES-GCM Authenticated Encryption in the Cryptographic Message Syntax (CMS). RFC Editor, November 2007. http://dx.doi.org/10.17487/rfc5084.
Повний текст джерелаHousley, R. Using the AES-GMAC Algorithm with the Cryptographic Message Syntax (CMS). RFC Editor, June 2021. http://dx.doi.org/10.17487/rfc9044.
Повний текст джерелаTaiber, Joachim. Unsettled Topics Concerning the Impact of Quantum Technologies on Automotive Cybersecurity. SAE International, December 2020. http://dx.doi.org/10.4271/epr2020026.
Повний текст джерелаSchaad, J. Use of the Advanced Encryption Standard (AES) Encryption Algorithm in Cryptographic Message Syntax (CMS). RFC Editor, July 2003. http://dx.doi.org/10.17487/rfc3565.
Повний текст джерелаDolotii, Marharyta H., and Pavlo V. Merzlykin. Using the random number generator with a hardware entropy source for symmetric cryptography problems. [б. в.], December 2018. http://dx.doi.org/10.31812/123456789/2883.
Повний текст джерелаIorga, Michaela, and Carroll Brickenkamp. National Voluntary Laboratory Accreditation Program (NVLAP) cryptographic and security testing. Gaithersburg, MD: National Institute of Standards and Technology (U.S.), June 2008. http://dx.doi.org/10.6028/nist.hb.150-17e2008.
Повний текст джерелаAllende López, Marcos, Diego López, Sergio Cerón, Antonio Leal, Adrián Pareja, Marcelo Da Silva, Alejandro Pardo, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, June 2021. http://dx.doi.org/10.18235/0003313.
Повний текст джерела