Works matching DE "ADVANCED Encryption Standard"
Results: 567
Penerapan Advanced Encryption Standard pada Aplikasi Payment Gateway untuk Keamanan Data Transaksi Penjualan.
- Published in:
- Techno.com, 2025, v. 24, n. 1, p. 248, doi. 10.62411/tc.v24i1.12175
- By:
- Publication type:
- Article
HybridEdge: A Lightweight and Secure Hybrid Communication Protocol for the Edge-Enabled Internet of Things.
- Published in:
- Computers, Materials & Continua, 2025, v. 82, n. 2, p. 3161, doi. 10.32604/cmc.2025.060372
- By:
- Publication type:
- Article
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security.
- Published in:
- Computers, Materials & Continua, 2025, v. 82, n. 2, p. 2637, doi. 10.32604/cmc.2025.058717
- By:
- Publication type:
- Article
Securing Automatic Identification System Communications Using Physical-Layer Key Generation Protocol.
- Published in:
- Journal of Marine Science & Engineering, 2025, v. 13, n. 2, p. 386, doi. 10.3390/jmse13020386
- By:
- Publication type:
- Article
On Jargon: Alice in E-Voterland.
- Published in:
- UMAP Journal, 2021, v. 42, n. 2, p. 139
- By:
- Publication type:
- Article
Oracles and Signatures.
- Published in:
- UMAP Journal, 2018, v. 39, n. 4, p. 373
- By:
- Publication type:
- Article
Multiple image watermarking with dual authentication for smart and safe city environment.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 22, p. 62181, doi. 10.1007/s11042-023-16523-2
- By:
- Publication type:
- Article
Secure visual communication with advanced cryptographic and ımage processing techniques.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 15, p. 45367, doi. 10.1007/s11042-023-17224-6
- By:
- Publication type:
- Article
Implementation of a block cipher algorithm for medical information security on cloud environment: using modified advanced encryption standard approach.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 13, p. 20537, doi. 10.1007/s11042-023-14338-9
- By:
- Publication type:
- Article
Modified advanced encryption standard (MAES) based on non-associative inverse property loop.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 11, p. 16237, doi. 10.1007/s11042-022-14064-8
- By:
- Publication type:
- Article
Multi-level image security using elliptic curve and magic matrix with advanced encryption standard.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 26, p. 37783, doi. 10.1007/s11042-022-12993-y
- By:
- Publication type:
- Article
Secure data transmission in a real-time network for a tele-training education system.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 19, p. 27819, doi. 10.1007/s11042-022-12903-2
- By:
- Publication type:
- Article
A unified improvement of the AES algorithm.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 13, p. 18875, doi. 10.1007/s11042-022-12742-1
- By:
- Publication type:
- Article
A new high capacity and secure image realization steganography based on ASCII code matching.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 4, p. 5191, doi. 10.1007/s11042-021-11741-y
- By:
- Publication type:
- Article
Real-time video security system using chaos- improved advanced encryption standard (IAES).
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 2, p. 2275, doi. 10.1007/s11042-021-11668-4
- By:
- Publication type:
- Article
An Efficient Substitution Box design with a chaotic logistic map and Linear Congruential Generator for secure communication in Smart cities.
- Published in:
- EAI Endorsed Transactions on Smart Cities, 2023, v. 7, n. 1, p. 1, doi. 10.4108/eetsc.v7i1.2845
- By:
- Publication type:
- Article
HIDING VOICE MESSAGE USING BOTH CRYPTOGRAPHY AND STEGANOGRAPHY.
- Published in:
- Al-Qadisiyah Journal of Pure Science, 2020, v. 25, n. 1, p. 10
- By:
- Publication type:
- Article
16-bit S-box Design Method Based on L-M-NFSR Structure.
- Published in:
- Journal of Frontiers of Computer Science & Technology, 2023, v. 17, n. 10, p. 2511, doi. 10.3778/j.issn.1673-9418.2207012
- By:
- Publication type:
- Article
A modified MixColumn-InversMixColumn in AES algorithm suitable for hardware implementation using FPGA device.
- Published in:
- Communications in Science & Technology, 2023, v. 8, n. 2, p. 198, doi. 10.21924/cst.8.2.2023.1257
- By:
- Publication type:
- Article
A novel grouping proof authentication protocol for lightweight devices: GPAPXR+.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2020, v. 28, n. 5, p. 3036, doi. 10.3906/elk-2004-5
- By:
- Publication type:
- Article
The Last Crypto Question.
- Published in:
- ISSA Journal, 2023, v. 21, n. 9, p. 8
- By:
- Publication type:
- Article
Cryptographic Transitions: Historical Considerations.
- Published in:
- ISSA Journal, 2022, v. 20, n. 9, p. 16
- By:
- Publication type:
- Article
The Many Ways of BYOK.
- Published in:
- ISSA Journal, 2021, v. 19, n. 2, p. 37
- By:
- Publication type:
- Article
Quantum Cryptography: Myths, Legends, and Hypothesis.
- Published in:
- ISSA Journal, 2021, v. 19, n. 1, p. 22
- By:
- Publication type:
- Article
The Impact of Cryptocurrency on Modern-Day Cybercrime.
- Published in:
- ISSA Journal, 2018, v. 16, n. 12, p. 23
- By:
- Publication type:
- Article
White-Box Cryptography.
- Published in:
- ISSA Journal, 2016, v. 14, n. 4, p. 47
- By:
- Publication type:
- Article
Chaos Meets Cryptography: Developing an S-Box Design with the Rössler Attractor.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 22, p. 4575, doi. 10.3390/math11224575
- By:
- Publication type:
- Article
Generation of Boxes and Permutations Using a Bijective Function and the Lorenz Equations: An Application to Color Image Encryption.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 3, p. 599, doi. 10.3390/math11030599
- By:
- Publication type:
- Article
A Comprehensive Analysis of LoRaWAN Key Security Models and Possible Attack Solutions.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 19, p. 3421, doi. 10.3390/math10193421
- By:
- Publication type:
- Article
Relationships between the Chicken McNugget Problem, Mutations of Brauer Configuration Algebras and the Advanced Encryption Standard.
- Published in:
- Mathematics (2227-7390), 2021, v. 9, n. 16, p. 1937, doi. 10.3390/math9161937
- By:
- Publication type:
- Article
NAES-512:抗量子計算512位元先進密碼技術 之設計與FPGA 實現.
- Published in:
- Journal of Advanced Technology & Management, 2024, v. 13, n. 1, p. 1, doi. 10.6193/JATM.202411_13(1).0001
- By:
- Publication type:
- Article
Secure Communication through MultiAgent System-Based Diabetes Diagnosing and Classification.
- Published in:
- Journal of Intelligent Systems, 2020, v. 29, n. 1, p. 703, doi. 10.1515/jisys-2017-0353
- By:
- Publication type:
- Article
An Efficient 2048-bit Block Cipher.
- Published in:
- Malaysian Journal of Mathematical Sciences, 2021, v. 15, p. 141
- By:
- Publication type:
- Article
Intelligent two-phase dual authentication framework for Internet of Medical Things.
- Published in:
- Scientific Reports, 2025, v. 15, n. 1, p. 1, doi. 10.1038/s41598-024-84713-5
- By:
- Publication type:
- Article
Secure cloud computing: leveraging GNN and leader K-means for intrusion detection optimization.
- Published in:
- Scientific Reports, 2024, v. 14, n. 1, p. 1, doi. 10.1038/s41598-024-81442-7
- By:
- Publication type:
- Article
Development of Advanced Encryption Standard Architecture with Sbox Parity.
- Published in:
- Walailak Journal of Science & Technology, 2017, v. 14, n. 4, p. 315
- By:
- Publication type:
- Article
A Hybrid Technique of Combining AES Algorithm with Block Permutation for Image Encryption.
- Published in:
- Reliability: Theory & Applications, 2020, v. 15, n. 1, p. 51
- By:
- Publication type:
- Article
Security Enhancement for Data Migration in the Cloud.
- Published in:
- Future Internet, 2017, v. 9, n. 3, p. 23, doi. 10.3390/fi9030023
- By:
- Publication type:
- Article
Symmetry Analysis in Construction Two Dynamic Lightweight S-Boxes Based on the 2D Tinkerbell Map and the 2D Duffing Map.
- Published in:
- Symmetry (20738994), 2024, v. 16, n. 7, p. 872, doi. 10.3390/sym16070872
- By:
- Publication type:
- Article
A Novel Hybrid MSA-CSA Algorithm for Cloud Computing Task Scheduling Problems.
- Published in:
- Symmetry (20738994), 2023, v. 15, n. 10, p. 1931, doi. 10.3390/sym15101931
- By:
- Publication type:
- Article
Implementing a Symmetric Lightweight Cryptosystem in Highly Constrained IoT Devices by Using a Chaotic S-Box.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 1, p. 129, doi. 10.3390/sym13010129
- By:
- Publication type:
- Article
Securing Fingerprint Template Using Blockchain and Distributed Storage System.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 6, p. 951, doi. 10.3390/sym12060951
- By:
- Publication type:
- Article
A Selective Video Encryption Scheme Based on Coding Characteristics.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 3, p. 332, doi. 10.3390/sym12030332
- By:
- Publication type:
- Article
FPGA Implementation and Design of a Hybrid Chaos-AES Color Image Encryption Algorithm.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 2, p. 189, doi. 10.3390/sym12020189
- By:
- Publication type:
- Article
Modified Advanced Encryption Standard Algorithm for Information Security.
- Published in:
- Symmetry (20738994), 2019, v. 11, n. 12, p. 1484, doi. 10.3390/sym11121484
- By:
- Publication type:
- Article
Construction of S-Box Based on Chaotic Map and Algebraic Structures.
- Published in:
- Symmetry (20738994), 2019, v. 11, n. 3, p. 351, doi. 10.3390/sym11030351
- By:
- Publication type:
- Article
Cryptanalysis and Improvement on an Image Encryption Algorithm Design Using a Novel Chaos Based S-Box.
- Published in:
- Symmetry (20738994), 2018, v. 10, n. 9, p. 399, doi. 10.3390/sym10090399
- By:
- Publication type:
- Article
Development of Patient Status-Based Dynamic Access System for Medical Information Systems.
- Published in:
- Symmetry (20738994), 2015, v. 7, n. 2, p. 1028, doi. 10.3390/sym7021028
- By:
- Publication type:
- Article
Strengthened of AES Encryption Algorithms within New Logic Topology.
- Published in:
- Majlesi Journal of Electrical Engineering, 2018, v. 12, n. 1, p. 87
- By:
- Publication type:
- Article
Hardware Implementation of 128-Bit AES Image Encryption with Low Power Techniques on FPGA.
- Published in:
- Majlesi Journal of Electrical Engineering, 2012, v. 6, n. 4, p. 13
- By:
- Publication type:
- Article