Works matching DE "ADVANCED Encryption Standard"
Results: 571
Novel design of cryptosystems for video/audio streaming via dynamic synchronized chaos-based random keys.
- Published in:
- Multimedia Systems, 2022, v. 28, n. 5, p. 1793, doi. 10.1007/s00530-022-00950-6
- By:
- Publication type:
- Article
Study of transmission system for compressed and encrypted image.
- Published in:
- Multimedia Systems, 2021, v. 27, n. 3, p. 471, doi. 10.1007/s00530-020-00737-7
- By:
- Publication type:
- Article
A Novel Image Encryption Technique Based on Generalized Advanced Encryption Standard Based on Field of Any Characteristic.
- Published in:
- Wireless Personal Communications, 2019, v. 109, n. 2, p. 849, doi. 10.1007/s11277-019-06594-6
- By:
- Publication type:
- Article
Secure Data Transfer Using Multi Layer Security Protocol with Energy Power Consumption AODV in Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2018, v. 103, n. 4, p. 3055, doi. 10.1007/s11277-018-5994-9
- By:
- Publication type:
- Article
A High Security RFID System Authentication Protocol Design Base on Cloud Computer.
- Published in:
- Wireless Personal Communications, 2018, v. 102, n. 2, p. 1255, doi. 10.1007/s11277-017-5192-1
- By:
- Publication type:
- Article
Embedding the MRC and SC Schemes into Trust Management Algorithm Applied to IoT Security Protection.
- Published in:
- Wireless Personal Communications, 2018, v. 99, n. 1, p. 461, doi. 10.1007/s11277-017-5120-4
- By:
- Publication type:
- Article
A Novel Algebraic Technique for the Construction of Strong Substitution Box.
- Published in:
- Wireless Personal Communications, 2018, v. 99, n. 1, p. 213, doi. 10.1007/s11277-017-5054-x
- By:
- Publication type:
- Article
Secure Audio Cryptosystem Using Hashed Image LSB watermarking and Encryption.
- Published in:
- Wireless Personal Communications, 2018, v. 98, n. 2, p. 2009, doi. 10.1007/s11277-017-4960-2
- By:
- Publication type:
- Article
High Throughput AES Algorithm Using Parallel Subbytes and MixColumn.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 2, p. 1433, doi. 10.1007/s11277-016-3858-8
- By:
- Publication type:
- Article
An Efficient Hardware Architecture for High Throughput AES Encryptor Using MUX Based Sub Pipelined S-Box.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 4, p. 2259, doi. 10.1007/s11277-016-3385-7
- By:
- Publication type:
- Article
Cryptanalysis of a High-Definition Image Encryption Based on AES Modification.
- Published in:
- Wireless Personal Communications, 2016, v. 88, n. 3, p. 685, doi. 10.1007/s11277-016-3192-1
- By:
- Publication type:
- Article
PSP CO: An Efficient Hardware Architecture for AES Algorithm for High Throughput.
- Published in:
- Wireless Personal Communications, 2015, v. 85, n. 1, p. 305, doi. 10.1007/s11277-015-2739-x
- By:
- Publication type:
- Article
An Experimental Comparison of Chaotic and Non-chaotic Image Encryption Schemes.
- Published in:
- Wireless Personal Communications, 2015, v. 84, n. 2, p. 901, doi. 10.1007/s11277-015-2667-9
- By:
- Publication type:
- Article
A Technique for Designing Substitution Box Based on Van der Pol Oscillator.
- Published in:
- Wireless Personal Communications, 2015, v. 82, n. 3, p. 1497, doi. 10.1007/s11277-015-2295-4
- By:
- Publication type:
- Article
High Definition Image Encryption Algorithm Based on AES Modification.
- Published in:
- Wireless Personal Communications, 2014, v. 79, n. 2, p. 811, doi. 10.1007/s11277-014-1888-7
- By:
- Publication type:
- Article
A Noisy Channel Tolerant Image Encryption Scheme.
- Published in:
- Wireless Personal Communications, 2014, v. 77, n. 4, p. 2771, doi. 10.1007/s11277-014-1667-5
- By:
- Publication type:
- Article
An Efficient Quasigroup Block Cipher.
- Published in:
- Wireless Personal Communications, 2013, v. 73, n. 1, p. 63, doi. 10.1007/s11277-012-0959-x
- By:
- Publication type:
- Article
基于AES算法的 eFlash 控制器安全设计.
- Published in:
- Electronic Science & Technology, 2023, v. 36, n. 10, p. 62, doi. 10.16180/j.cnki.issn1007-7820.2023.10.008
- By:
- Publication type:
- Article
基于轻量级分组密码算法的 SoC 安全存储器设计.
- Published in:
- Electronic Science & Technology, 2023, v. 36, n. 9, p. 15, doi. 10.16180/j.cnki.issn1007-7820.2023.09.003
- By:
- Publication type:
- Article
SECURE FILES STORAGE IN CLOUD USING HYBRID CRYPTOGRAPHY.
- Published in:
- i-Manager's Journal On Cloud Computing, 2020, v. 7, n. 2, p. 8, doi. 10.26634/jcc.7.2.18291
- By:
- Publication type:
- Article
Establishing a Resilient and Protected Virtual Private Network (VPN) Infrastructure to Safeguard Network Communications and Ensure Secure Connectivity.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 4264
- By:
- Publication type:
- Article
Develop a High Storage Cloud Platform that Provides Enhanced Security.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 3960
- By:
- Publication type:
- Article
Enhancing Security of the Healthcare Sector using Visual Cryptography.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2, Part 2, p. 1495
- By:
- Publication type:
- Article
Secure Data Communication in a Clustered Network in Wireless Sensor Networks using AES Cipher.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 1, p. 308
- By:
- Publication type:
- Article
Composite Cryptographic Methodologies for Data Transmission Model using Modified Vigenère and Extended Polybius Cipher.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 2, p. 358
- By:
- Publication type:
- Article
Performance Analysis of AES-128 Bits, 192 Bits and 256 Bits using Reversible Logic.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2018, v. 4, n. 2, p. 42
- By:
- Publication type:
- Article
Reversible Logic based Modified Design of AES-CBC Mode.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2018, v. 4, n. 2, p. 48
- By:
- Publication type:
- Article
Accelerating DES and AES Algorithms for a Heterogeneous Many-core Processor.
- Published in:
- International Journal of Parallel Programming, 2021, v. 49, n. 3, p. 463, doi. 10.1007/s10766-021-00692-4
- By:
- Publication type:
- Article
High Performance GCM Architecture for the Security of High Speed Network.
- Published in:
- International Journal of Parallel Programming, 2018, v. 46, n. 5, p. 904, doi. 10.1007/s10766-017-0545-7
- By:
- Publication type:
- Article
Secure Communication through MultiAgent System-Based Diabetes Diagnosing and Classification.
- Published in:
- Journal of Intelligent Systems, 2020, v. 29, n. 1, p. 703, doi. 10.1515/jisys-2017-0353
- By:
- Publication type:
- Article
Evaluating AES Security: Correlation Power Analysis Attack Implementation using the Switching Distance Power Model.
- Published in:
- Engineering, Technology & Applied Science Research, 2025, v. 15, n. 1, p. 20314, doi. 10.48084/etasr.9728
- By:
- Publication type:
- Article
Face Mask Detection using CNN: A Fusion of Cryptography and Blockchain.
- Published in:
- Engineering, Technology & Applied Science Research, 2024, v. 14, n. 5, p. 17156, doi. 10.48084/etasr.7827
- By:
- Publication type:
- Article
PILEA, an Advanced Hybrid Lightweight Algorithm utilizing Logical Mathematical Functions and Chaotic Systems.
- Published in:
- Engineering, Technology & Applied Science Research, 2024, v. 14, n. 5, p. 16260, doi. 10.48084/etasr.7799
- By:
- Publication type:
- Article
Semantic IoT Transformation: Elevating Wireless Networking Performance through Innovative Communication Paradigms.
- Published in:
- Engineering, Technology & Applied Science Research, 2024, v. 14, n. 4, p. 15717, doi. 10.48084/etasr.7784
- By:
- Publication type:
- Article
Advancing Cloud Image Security via AES Algorithm Enhancement Techniques.
- Published in:
- Engineering, Technology & Applied Science Research, 2024, v. 14, n. 1, p. 12694, doi. 10.48084/etasr.6601
- By:
- Publication type:
- Article
AES High-Level SystemC Modeling using Aspect Oriented Programming Approach.
- Published in:
- Engineering, Technology & Applied Science Research, 2021, v. 11, n. 1, p. 6719, doi. 10.48084/etasr.3971
- By:
- Publication type:
- Article
Secure Data Encryption Through a Combination of AES, RSA and HMAC.
- Published in:
- Engineering, Technology & Applied Science Research, 2017, v. 7, n. 4, p. 1781, doi. 10.48084/etasr.1272
- By:
- Publication type:
- Article
Security‐ and safety‐critical cyber‐physical systems.
- Published in:
- Journal of Software: Evolution & Process, 2020, v. 32, n. 2, p. N.PAG, doi. 10.1002/smr.2239
- By:
- Publication type:
- Article
Analysing encryption mechanisms and functional safety in a ROS‐based architecture.
- Published in:
- Journal of Software: Evolution & Process, 2020, v. 32, n. 2, p. N.PAG, doi. 10.1002/smr.2224
- By:
- Publication type:
- Article
FAC-V: An FPGA-Based AES Coprocessor for RISC-V.
- Published in:
- Journal of Low Power Electronics & Applications, 2022, v. 12, n. 4, p. 50, doi. 10.3390/jlpea12040050
- By:
- Publication type:
- Article
Comprehensive Study of Side-Channel Attack on Emerging Non-Volatile Memories †.
- Published in:
- Journal of Low Power Electronics & Applications, 2021, v. 11, n. 4, p. 38, doi. 10.3390/jlpea11040038
- By:
- Publication type:
- Article
High Level Current Modeling for Shaping Electromagnetic Emissions in Micropipeline Circuits.
- Published in:
- Journal of Low Power Electronics & Applications, 2019, v. 9, n. 1, p. 6, doi. 10.3390/jlpea9010006
- By:
- Publication type:
- Article
Multi-Threshold Dual-Spacer Dual-Rail Delay-Insensitive Logic (MTD³L): A Low Overhead Secure IC Design Methodology.
- Published in:
- Journal of Low Power Electronics & Applications, 2013, v. 3, n. 4, p. 300, doi. 10.3390/jlpea3040300
- By:
- Publication type:
- Article
THE SECURITY ANALYSIS ON THE RABBIT STREAM CIPHER.
- Published in:
- International Journal on Information Technologies & Security, 2024, v. 16, n. 2, p. 91, doi. 10.59035/swyf4934
- By:
- Publication type:
- Article
Secure data transmission in wireless networking through node deployment and Artificial Bird optimized deep learning network.
- Published in:
- Telecommunication Systems, 2024, v. 87, n. 4, p. 1067, doi. 10.1007/s11235-024-01225-3
- By:
- Publication type:
- Article
Hybrid Encryption Technique to Enhance Security of Health Data in Cloud Environment.
- Published in:
- Archives of Pharmacy Practice, 2023, v. 14, n. 3, p. 41, doi. 10.51847/raeh8fHBt6
- By:
- Publication type:
- Article
Enhancing Supply Chain Transparency and Efficiency Through Innovative Blockchain Solutions for Optimal Operations Management.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 9, p. 745, doi. 10.14569/ijacsa.2024.0150976
- By:
- Publication type:
- Article
Secure Sharing of Patient Controlled e-Health Record using an Enhanced Access Control Model with Encryption Based on User Identity.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 3, p. 1267, doi. 10.14569/ijacsa.2024.01503124
- By:
- Publication type:
- Article
Strengthening AES Security Through Key-Dependent ShiftRow and AddRoundKey Transformations Utilizing Permutation.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2023, v. 14, n. 11, p. 699, doi. 10.14569/ijacsa.2023.0141171
- By:
- Publication type:
- Article
A Survey on Various Cryptanalytic Attacks on the AES Algorithm.
- Published in:
- International Journal of Next-Generation Computing, 2021, v. 12, n. 2, p. 115
- By:
- Publication type:
- Article