Статті в журналах з теми "AES CRYPTOGRAPHY"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "AES CRYPTOGRAPHY".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Yang, Huiwei. "Application of Hybrid Encryption Algorithm in Hardware Encryption Interface Card." Security and Communication Networks 2022 (May 30, 2022): 1–11. http://dx.doi.org/10.1155/2022/7794209.
Повний текст джерелаRaut, Kinjal. "A Comprehensive Review of Cryptographic Algorithms." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (December 31, 2021): 1750–56. http://dx.doi.org/10.22214/ijraset.2021.39581.
Повний текст джерелаWang, Xing, Qiang Zhang, and Xiao Peng Wei. "A New Encryption Method Based on Rijndael Algorithm and DNA Computing." Applied Mechanics and Materials 20-23 (January 2010): 1241–46. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1241.
Повний текст джерелаDhansukhbhai Patel, Dr Dipakkumar, and Dr Subhashchandra Desai. "Securing textual information with an image in the image using a visual cryptography AES algorithm." International Journal of Enhanced Research in Management & Computer Applications 12, no. 06 (2023): 75–90. http://dx.doi.org/10.55948/ijermca.2023.0611.
Повний текст джерелаAhamad, Md Martuza, and Md Ibrahim Abdullah. "Comparison of Encryption Algorithms for Multimedia." Rajshahi University Journal of Science and Engineering 44 (November 19, 2016): 131–39. http://dx.doi.org/10.3329/rujse.v44i0.30398.
Повний текст джерелаSingh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications." Mathematical Statistician and Engineering Applications 70, no. 1 (January 31, 2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.
Повний текст джерелаB S, Aditya, and Sharadadevi Kaganurmath. "Use of Cryptography and Signing for Network Security." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (July 31, 2022): 4080–83. http://dx.doi.org/10.22214/ijraset.2022.45926.
Повний текст джерелаArifianto, Sofyan, Shinta Permatasari, and Aminudin Aminudin. "Modifikasi enkripsi dan dekripsi AES menggunakan polybius chiper dalam pengamanan data." Jurnal Repositor 1, no. 2 (December 31, 2019): 117. http://dx.doi.org/10.22219/repositor.v1i2.808.
Повний текст джерелаKurbet, ejashwini C., and Jenitta J. "NANO-AES Security Algorithm for Image Cryptography." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (August 31, 2023): 742–46. http://dx.doi.org/10.22214/ijraset.2023.55238.
Повний текст джерелаTahir, Ari Shawkat. "A Modified Advanced Encryption Standard Algorithm for Image Encryption." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 11 (August 14, 2015): 6258–67. http://dx.doi.org/10.24297/ijct.v14i11.1811.
Повний текст джерелаShah, Aayush, Prabhat Mahato, and Aadarsh Bhagat. "Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (August 31, 2023): 1626–42. http://dx.doi.org/10.22214/ijraset.2023.55341.
Повний текст джерелаSatapure, Pratiksha. "Different Methods of Encryption and Decryption." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (November 30, 2021): 170–77. http://dx.doi.org/10.22214/ijraset.2021.38732.
Повний текст джерелаMustika, Laila. "Implementasi Algoritma AES Untuk Pengamanan Login Dan Data Customer Pada E-Commerce Berbasis Web." JURIKOM (Jurnal Riset Komputer) 7, no. 1 (February 15, 2020): 148. http://dx.doi.org/10.30865/jurikom.v7i1.1943.
Повний текст джерелаVerma, Rohit, and Aman Kumar Sharma. "Cryptography: Avalanche effect of AES and RSA." International Journal of Scientific and Research Publications (IJSRP) 10, no. 4 (April 6, 2020): p10013. http://dx.doi.org/10.29322/ijsrp.10.04.2020.p10013.
Повний текст джерелаAllakany, Alaa, Abeer Saber, Samih M. Mostafa, Maazen Alsabaan, Mohamed I. Ibrahem, and Haitham Elwahsh. "Enhancing Security in ZigBee Wireless Sensor Networks: A New Approach and Mutual Authentication Scheme for D2D Communication." Sensors 23, no. 12 (June 19, 2023): 5703. http://dx.doi.org/10.3390/s23125703.
Повний текст джерелаSweatha, A. Anjalin, and K. Mohaideen Pitchai. "Construction of Cryptographically Secure AES S-Box using Second-order Reversible Cellular Automata." Journal of Intelligent & Fuzzy Systems 39, no. 3 (October 7, 2020): 4313–18. http://dx.doi.org/10.3233/jifs-200326.
Повний текст джерелаO. O, Rejuaro, Adetunji A. B., Adedeji F., Falohun A. S., Iromini N. A., and Adebajo O. O. "Development of an Improved Access Control System using an Enhanced Bimodal Crypto-Biometric System." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 752–68. http://dx.doi.org/10.22214/ijraset.2023.49548.
Повний текст джерелаOlaniyan, Olatayo Moses, Ayobami Taiwo Olusesi, Bolaji Abigail Omodunbi, Wajeed Bolanle Wahab, Olusogo Julius Adetunji, and Bamidele Musiliu Olukoya. "A Data Security Model for Mobile Ad Hoc Network Using Linear Function Mayfly Advanced Encryption Standard." International Journal of Emerging Technology and Advanced Engineering 13, no. 3 (March 1, 2023): 101–10. http://dx.doi.org/10.46338/ijetae0323_10.
Повний текст джерелаMohammad, Hussein M., and Alharith A. Abdullah. "Enhancement process of AES: a lightweight cryptography algorithm-AES for constrained devices." TELKOMNIKA (Telecommunication Computing Electronics and Control) 20, no. 3 (June 1, 2022): 551. http://dx.doi.org/10.12928/telkomnika.v20i3.23297.
Повний текст джерелаEt. al., Arsha Kolate,. "An Information Security Using DNA Cryptography along with AES Algorithm." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 1S (April 11, 2021): 183–92. http://dx.doi.org/10.17762/turcomat.v12i1s.1607.
Повний текст джерелаYan, Tian Yun, Kai Kuo Xu, Min Wei, and Jia He. "Studies on Security Communications of Embedded Devices." Advanced Materials Research 216 (March 2011): 609–12. http://dx.doi.org/10.4028/www.scientific.net/amr.216.609.
Повний текст джерелаT, Ramya, Ramya G, Karthik Raju, Ravi J, and Deepak Verma. "An Efficient AES Algorithm for Cryptography Using VLSI." ECS Transactions 107, no. 1 (April 24, 2022): 5605–12. http://dx.doi.org/10.1149/10701.5605ecst.
Повний текст джерелаVijayarajan, R., P. Gnanasivam, and R. Avudaiammal. "Bio-Key Based AES for Personalized Image Cryptography." Computer Journal 62, no. 11 (April 10, 2019): 1695–705. http://dx.doi.org/10.1093/comjnl/bxz030.
Повний текст джерелаSingh, Pankaj, and Sachin Kumar. "Study & analysis of cryptography algorithms : RSA, AES, DES, T-DES, blowfish." International Journal of Engineering & Technology 7, no. 1.5 (December 31, 2017): 221. http://dx.doi.org/10.14419/ijet.v7i1.5.9150.
Повний текст джерелаSinghal, Yash, Adwit Agarwal, Shivank Mittal, Shristi Katyayani, and Amit Sharma. "Database Security using Cryptography." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 582–87. http://dx.doi.org/10.22214/ijraset.2022.43621.
Повний текст джерелаTabeidi, Rania A., and Samia M. Masaad. "Survey and Analysis of the Evolution of Wireless Security in IEEE 802.11 Standards using Advanced Encryption Standard (AES)." Circulation in Computer Science 2, no. 10 (November 20, 2017): 1–7. http://dx.doi.org/10.22632/ccs-2017-252-01.
Повний текст джерелаChang, Lipeng, Yuechuan Wei, Xiangru Wang, and Xiaozhong Pan. "Collision Forgery Attack on the AES-OTR Algorithm under Quantum Computing." Symmetry 14, no. 7 (July 13, 2022): 1434. http://dx.doi.org/10.3390/sym14071434.
Повний текст джерелаBagul, Riya, Atharva Karaguppi, Vishwas Karale, Mudit Singal, and Dr Vaishali Ingale. "A Dynamic and Highly Configurable Crypto-Processor for brief communication interval." Journal of University of Shanghai for Science and Technology 23, no. 05 (May 25, 2021): 551–61. http://dx.doi.org/10.51201/jusst/21/05162.
Повний текст джерелаChowdhary, Chiranji Lal, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan Perumal, and Muhammad Fazal Ijaz. "Analytical Study of Hybrid Techniques for Image Encryption and Decryption." Sensors 20, no. 18 (September 10, 2020): 5162. http://dx.doi.org/10.3390/s20185162.
Повний текст джерелаShukla, Piyush Kumar, Amer Aljaedi, Piyush Kumar Pareek, Adel R. Alharbi, and Sajjad Shaukat Jamal. "AES Based White Box Cryptography in Digital Signature Verification." Sensors 22, no. 23 (December 2, 2022): 9444. http://dx.doi.org/10.3390/s22239444.
Повний текст джерелаLi, Juan. "A Symmetric Cryptography Algorithm in Wireless Sensor Network Security." International Journal of Online Engineering (iJOE) 13, no. 11 (November 22, 2017): 102. http://dx.doi.org/10.3991/ijoe.v13i11.7752.
Повний текст джерелаOukili, Soufiane, and Seddik Bri. "Hardware Implementation of AES Algorithm with Logic S-box." Journal of Circuits, Systems and Computers 26, no. 09 (April 24, 2017): 1750141. http://dx.doi.org/10.1142/s0218126617501419.
Повний текст джерелаEt. al., Pravin Soni,. "Performance Analysis of Cascaded Hybrid Symmetric Encryption Models." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 1699–708. http://dx.doi.org/10.17762/turcomat.v12i2.1506.
Повний текст джерелаAz, Maulyanda, Syafrial Fachri Pane, and Rolly Maulana Awangga. "Cryptography: Cryptography: Perancangan Middleware Web Service Encryptor menggunakan Triple Key MD5. Base64, dan AES." Jurnal Tekno Insentif 15, no. 2 (October 31, 2021): 65–75. http://dx.doi.org/10.36787/jti.v15i1.497.
Повний текст джерелаGayathri, P., Syed Umar, G. Sridevi, N. Bashwanth, and Royyuru Srikanth. "Hybrid Cryptography for Random-key Generation based on ECC Algorithm." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 3 (June 1, 2017): 1293. http://dx.doi.org/10.11591/ijece.v7i3.pp1293-1298.
Повний текст джерелаKumar, Thanikodi Manoj, Kasarla Satish Reddy, Stefano Rinaldi, Bidare Divakarachari Parameshachari, and Kavitha Arunachalam. "A Low Area High Speed FPGA Implementation of AES Architecture for Cryptography Application." Electronics 10, no. 16 (August 21, 2021): 2023. http://dx.doi.org/10.3390/electronics10162023.
Повний текст джерелаM, Santhanalakshmi, Ms Lakshana K, and Ms Shahitya G M. "Enhanced AES-256 cipher round algorithm for IoT applications." Scientific Temper 14, no. 01 (March 25, 2023): 184–90. http://dx.doi.org/10.58414/scientifictemper.2023.14.1.22.
Повний текст джерелаFazila, S., B. Reddaiah, S. Sai Ramya, B. J. Karuna Sagar, and C. Swetha. "Enhancing AES with Key Dependent S-Box and Transpose MDS Matrix." International Journal of Innovative Technology and Exploring Engineering 11, no. 9 (August 30, 2022): 61–66. http://dx.doi.org/10.35940/ijitee.g9245.0811922.
Повний текст джерелаG. Chaloop, Samir, and Mahmood Z. Abdullah. "ENHANCING HYBRID SECURITY APPROACH USING AES AND RSA ALGORITHMS." Journal of Engineering and Sustainable Development 25, no. 4 (July 1, 2021): 58–66. http://dx.doi.org/10.31272/jeasd.25.4.6.
Повний текст джерелаPyrkova, A. YU, and ZH E. Temirbekova. "Compare encryption performance across devices to ensure the security of the IOT." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 2 (November 1, 2020): 894. http://dx.doi.org/10.11591/ijeecs.v20.i2.pp894-902.
Повний текст джерелаSingh, Amritpal, Mohit Marwaha, Baljinder Singh, and Sandeep Singh. "Comparative Study of DES, 3DES, AES and RSA." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 9, no. 3 (July 21, 2013): 1162–70. http://dx.doi.org/10.24297/ijct.v9i3.3342.
Повний текст джерелаNurnaningsih, Desi, and Angga Aditya Permana. "RANCANGAN APLIKASI PENGAMANAN DATA DENGAN ALGORITMA ADVANCED ENCYPTION STANDARD (AES)." JURNAL TEKNIK INFORMATIKA 11, no. 2 (November 28, 2018): 177–86. http://dx.doi.org/10.15408/jti.v11i2.7811.
Повний текст джерелаTaufiqqurrachman, Taufiqurrachman, and Dani Elsandi. "Security Analysis and Encryption Time Comparison Description on Cryptography Advanced Encryption Standard (AES)." Jurnal Inovatif : Inovasi Teknologi Informasi dan Informatika 5, no. 1 (July 1, 2022): 60. http://dx.doi.org/10.32832/inova-tif.v5i1.8345.
Повний текст джерелаP, Varsha, and Dr V. Nanammal. "Image Cryptography Design Based on Nano AES Security Algorithm." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 590–93. http://dx.doi.org/10.22214/ijraset.2022.46613.
Повний текст джерелаFei, Xiongwei, Kenli Li, and Wangdong Yang. "A fast parallel cryptography algorithm based on AES-NI." Journal of Intelligent & Fuzzy Systems 31, no. 2 (July 22, 2016): 1099–107. http://dx.doi.org/10.3233/jifs-169039.
Повний текст джерелаAdlani, M. Adharis, and Ricky Eka Putra. "Pengamanan Mnemonic Phrase Menggunakan Modified Advanced Encryption Standart." Journal of Informatics and Computer Science (JINACS) 3, no. 04 (June 10, 2022): 425–34. http://dx.doi.org/10.26740/jinacs.v3n04.p425-434.
Повний текст джерелаMohamad, Rafidah. "Data hiding by using AES Algorithm." Wasit Journal of Computer and Mathematics Science 1, no. 4 (December 31, 2022): 112–19. http://dx.doi.org/10.31185/wjcm.82.
Повний текст джерелаKulkarni, Utkarsha, Rosemeen Mansuri, and Riya Adikane. "File Storage on Cloud Using Cryptography." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 1950–53. http://dx.doi.org/10.22214/ijraset.2022.42652.
Повний текст джерелаSivamurugan, D., and L. Raja. "SECURE ROUTING IN MANET USING HYBRID CRYPTOGRAPHY." International Journal of Research -GRANTHAALAYAH 5, no. 4 (April 30, 2017): 83–91. http://dx.doi.org/10.29121/granthaalayah.v5.i4.2017.1798.
Повний текст джерелаIftikhar, U., K. Asrar, M. Waqas, and S. A. Ali. "Evaluating the Performance Parameters of Cryptographic Algorithms for IOT-based Devices." Engineering, Technology & Applied Science Research 11, no. 6 (December 11, 2021): 7867–74. http://dx.doi.org/10.48084/etasr.4263.
Повний текст джерела