Works matching DE "ADVANCED Encryption Standard"
Results: 546
Power analysis attack against encryption devices: a comprehensive analysis of AES, DES, and BC3.
- Published in:
- Telkomnika, 2019, v. 17, n. 3, p. 1282, doi. 10.12928/TELKOMNIKA.v17i3.9384
- By:
- Publication type:
- Article
THE SECURITY OF TEXT DATA BASED ON CYCLIC CODES OVER ALGEBRAIC STRUCTURE.
- Published in:
- Thermal Science, 2024, v. 28, n. 6B, p. 5205, doi. 10.2298/TSCI2406205B
- By:
- Publication type:
- Article
High throughput FPGA implementation of Advanced Encryption Standard algorithm.
- Published in:
- Telkomnika, 2017, v. 15, n. 1, p. 494, doi. 10.12928/TELKOMNIKA.v15i1.4713
- By:
- Publication type:
- Article
Another Security Evaluation of SPA Countermeasures for AES Key Expansion in IoT Devices.
- Published in:
- Journal of Information Science & Engineering, 2017, v. 33, n. 4, p. 1085, doi. 10.6688/JISE.2017.33.4.15
- By:
- Publication type:
- Article
IoT integration of securable optical transmission using Paillier assisted advanced encryption standard.
- Published in:
- Optical & Quantum Electronics, 2023, v. 55, n. 13, p. 1, doi. 10.1007/s11082-023-05459-4
- By:
- Publication type:
- Article
Polynomial cryptographic optical steganography substitution model for the telehealth system with multimedia data.
- Published in:
- Optical & Quantum Electronics, 2023, v. 55, n. 9, p. 1, doi. 10.1007/s11082-023-05084-1
- By:
- Publication type:
- Article
Two-level security approach combining watermarking and encryption for securing critical colored images.
- Published in:
- Optical & Quantum Electronics, 2021, v. 53, n. 5, p. 1, doi. 10.1007/s11082-021-02875-2
- By:
- Publication type:
- Article
SDESA: secure cloud computing with gradient deep belief network and congruential advanced encryption.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 15, p. 23147, doi. 10.1007/s11227-024-06322-3
- By:
- Publication type:
- Article
Internet of medical things-based authentication for an optimized watermarking of encrypted EEG.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 3, p. 2970, doi. 10.1007/s11227-023-05566-9
- By:
- Publication type:
- Article
Hybrid cryptographic approach to enhance the mode of key management system in cloud environment.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 7, p. 7377, doi. 10.1007/s11227-022-04964-9
- By:
- Publication type:
- Article
Multi-modal text recognition and encryption in scanned document images.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 7, p. 7916, doi. 10.1007/s11227-022-04912-7
- By:
- Publication type:
- Article
A cluster-based practical key recovery attack on reduced-round AES using impossible-differential cryptanalysis.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 6, p. 6252, doi. 10.1007/s11227-022-04872-y
- By:
- Publication type:
- Article
Trust-based secure routing and message delivery protocol for signal processing attacks in IoT applications.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 3, p. 2882, doi. 10.1007/s11227-022-04766-z
- By:
- Publication type:
- Article
An improved secure file deduplication avoidance using CKHO based deep learning model in a cloud environment.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 13, p. 14892, doi. 10.1007/s11227-022-04436-0
- By:
- Publication type:
- Article
ORSCA-GPU: one round stream cipher algorithm for GPU implementation.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 9, p. 11744, doi. 10.1007/s11227-022-04335-4
- By:
- Publication type:
- Article
Implementation and optimization of ChaCha20 stream cipher on sunway taihuLight supercomputer.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 3, p. 4199, doi. 10.1007/s11227-021-04023-9
- By:
- Publication type:
- Article
Cryfa: a secure encryption tool for genomic data.
- Published in:
- Bioinformatics, 2019, v. 35, n. 1, p. 146, doi. 10.1093/bioinformatics/bty645
- By:
- Publication type:
- Article
Comprehensive Analysis of Internet Security Protocols and Standards for Enhanced Network Safety.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 332, doi. 10.54216/JCIM.150126
- By:
- Publication type:
- Article
First end‐to‐end PQC protected DPU‐to‐DPU communications.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2023, v. 59, n. 17, p. 1, doi. 10.1049/ell2.12901
- By:
- Publication type:
- Article
A method for fault recognition in the last three rounds of Advanced Encryption Standard.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2021, v. 57, n. 13, p. 511, doi. 10.1049/ell2.12188
- By:
- Publication type:
- Article
Precise methods for distinguishing S-box faults in laser injection attacks.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2019, v. 55, n. 25, p. 1333, doi. 10.1049/el.2019.2865
- By:
- Publication type:
- Article
finding the key.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2018, v. 54, n. 19, p. 1099, doi. 10.1049/el.2018.6772
- Publication type:
- Article
Deep learning-assisted and combined attack: a novel side-channel attack.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2018, v. 54, n. 19, p. 1114, doi. 10.1049/el.2018.5411
- By:
- Publication type:
- Article
Masked AES PUF: a new PUF against hybrid SCA/MLAs.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2018, v. 54, n. 10, p. 618, doi. 10.1049/el.2018.0735
- By:
- Publication type:
- Article
Design of ultra-low power AES encryption cores with silicon demonstration in SOTB CMOS process.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2017, v. 53, n. 23, p. 1512, doi. 10.1049/el.2017.2151
- By:
- Publication type:
- Article
The Security Evaluation of an Efficient Lightweight AES Accelerator †.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 2, p. 24, doi. 10.3390/cryptography8020024
- By:
- Publication type:
- Article
Applications of Neural Network-Based AI in Cryptography.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 3, p. 39, doi. 10.3390/cryptography7030039
- By:
- Publication type:
- Article
Evaluation of Rijndael Algorithm for Audio Encryption by Brute Force Attack.
- Published in:
- Journal of Engineering (17264073), 2024, v. 30, n. 11, p. 128, doi. 10.31026/j.eng.2024.11.08
- By:
- Publication type:
- Article
BUILD CRYPTOGRAPHIC SYSTEM FROM MULTI-BIOMETRICS USING MEERKAT ALGORITHM.
- Published in:
- Iraqi Journal for Computers & Informatics Ijci, 2019, v. 45, n. 2, p. 1, doi. 10.25195/ijci.v45i2.46
- By:
- Publication type:
- Article
INTELLIGENT AUTHENTICATION FOR IDENTITY AND ACCESS MANAGEMENT: A REVIEW PAPER.
- Published in:
- Iraqi Journal for Computers & Informatics Ijci, 2019, v. 45, n. 1, p. 6, doi. 10.25195/2017/4512
- By:
- Publication type:
- Article
Establishing a Resilient and Protected Virtual Private Network (VPN) Infrastructure to Safeguard Network Communications and Ensure Secure Connectivity.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 4264
- By:
- Publication type:
- Article
Develop a High Storage Cloud Platform that Provides Enhanced Security.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 3960
- By:
- Publication type:
- Article
Enhancing Security of the Healthcare Sector using Visual Cryptography.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2, Part 2, p. 1495
- By:
- Publication type:
- Article
Secure Data Communication in a Clustered Network in Wireless Sensor Networks using AES Cipher.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 1, p. 308
- By:
- Publication type:
- Article
Composite Cryptographic Methodologies for Data Transmission Model using Modified Vigenère and Extended Polybius Cipher.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 2, p. 358
- By:
- Publication type:
- Article
Reversible Logic based Modified Design of AES-CBC Mode.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2018, v. 4, n. 2, p. 48
- By:
- Publication type:
- Article
Performance Analysis of AES-128 Bits, 192 Bits and 256 Bits using Reversible Logic.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2018, v. 4, n. 2, p. 42
- By:
- Publication type:
- Article
Exploiting De-Noising Convolutional Neural Networks DnCNNs for an Efficient Watermarking Scheme: A Case for Information Retrieval.
- Published in:
- IETE Technical Review, 2021, v. 38, n. 2, p. 245, doi. 10.1080/02564602.2020.1721342
- By:
- Publication type:
- Article
Privacy Enforcement on Subscribers Data in Cloud Computing.
- Published in:
- Nigerian Journal of Technology, 2021, v. 40, n. 2, p. 308, doi. 10.4314/njt.v40i2.17
- By:
- Publication type:
- Article
SECURING DIGITIZED LIBRARY CIRCULATORY SYSTEM.
- Published in:
- Nigerian Journal of Technology, 2016, v. 35, n. 3, p. 598, doi. 10.4314/njt.v35i3.19
- By:
- Publication type:
- Article
Virtual Implementation of Simplified Advanced Encryption Standard (SAES).
- Published in:
- Asian Journal of Engineering, Sciences & Technology (AJEST), 2013, v. 3, n. 1, p. 1
- By:
- Publication type:
- Article
Design of decryption process for advanced encryption standard algorithm in system-on-chip.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2024, v. 14, n. 6, p. 6838, doi. 10.11591/ijece.v14i6.pp6838-6845
- By:
- Publication type:
- Article
Satellite image encryption using 2D standard map and advanced encryption standard with scrambling.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2024, v. 14, n. 5, p. 5153, doi. 10.11591/ijece.v14i5.pp5153-5171
- By:
- Publication type:
- Article
Advancing cryptographic security: a novel hybrid AES-RSA model with byte-level tokenization.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2024, v. 14, n. 4, p. 4306, doi. 10.11591/ijece.v14i4.pp4306-4314
- By:
- Publication type:
- Article
Enhancing wireless sensor network security with optimized cluster head selection and hybrid public-key encryption.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2024, v. 14, n. 3, p. 2976, doi. 10.11591/ijece.v14i3.pp2976-2987
- By:
- Publication type:
- Article
Comparative study on satellite based image encryption methods: a survey.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2024, v. 14, n. 3, p. 2843, doi. 10.11591/ijece.v14i3.pp2843-2853
- By:
- Publication type:
- Article
Convolutional neural network based key generation for security of data through encryption with advanced encryption standard.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2023, v. 13, n. 3, p. 2589, doi. 10.11591/ijece.v13i3.pp2589-2599
- By:
- Publication type:
- Article
Advanced approach for encryption using advanced encryption standard with chaotic map.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2023, v. 13, n. 2, p. 1708, doi. 10.11591/ijece.v13i2.pp1708-1723
- By:
- Publication type:
- Article
Hybrid information security system via combination of compression, cryptography, and image steganography.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2022, v. 12, n. 6, p. 6574, doi. 10.11591/ijece.v12i6.pp6574-6584
- By:
- Publication type:
- Article
Best S-box amongst differently sized S-boxes based on the avalanche effect in the advance encryption standard algorithm.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2022, v. 12, n. 6, p. 6535, doi. 10.11591/ijece.v12i6.pp6535-6544
- By:
- Publication type:
- Article