Works matching DE "DATA encryption standards"
Results: 25
NIST Cryptographic Algorithm and Module Validation Programs: Validating New Encryption Schemes.
- Published in:
- ISSA Journal, 2019, v. 17, n. 5, p. 37
- By:
- Publication type:
- Article
Guide to ISO 27001: UAE Case Stud.
- Published in:
- Issues in Informing Science & Information Technology, 2012, v. 9, p. 331
- By:
- Publication type:
- Article
Analysis of secured Optical Orthogonal Frequency Division Multiplexed System.
- Published in:
- Journal of Optical Communications, 2017, v. 38, n. 2, p. 189, doi. 10.1515/joc-2016-0075
- By:
- Publication type:
- Article
A Stream/Block Combination Image Encryption Algorithm Using Logistic Matrix to Scramble.
- Published in:
- International Journal of Nonlinear Sciences & Numerical Simulation, 2019, v. 20, n. 2, p. 167, doi. 10.1515/ijnsns-2018-0027
- By:
- Publication type:
- Article
A Symmetric Variable-Key Stream (SVKS) Data Encryption Standard (DES) Model for Long Distance Communication.
- Published in:
- World of Computer Science & Information Technology Journal, 2013, v. 3, n. 3, p. 60
- By:
- Publication type:
- Article
Secured medical image compression using DES encryption technique in Bandelet multiscale transform.
- Published in:
- International Journal of Wavelets, Multiresolution & Information Processing, 2018, v. 16, n. 4, p. -1, doi. 10.1142/S0219691318500285
- By:
- Publication type:
- Article
DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2017, v. 7, n. 2, p. 1032, doi. 10.11591/ijece.v7i2.pp1032-1041
- By:
- Publication type:
- Article
Security against Timing Analysis Attack.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2015, v. 5, n. 4, p. 759
- By:
- Publication type:
- Article
A Novel Algebraic Technique for the Construction of Strong Substitution Box.
- Published in:
- Wireless Personal Communications, 2018, v. 99, n. 1, p. 213, doi. 10.1007/s11277-017-5054-x
- By:
- Publication type:
- Article
An Upper Bound of the Longest Impossible Differentials of Several Block Ciphers.
- Published in:
- KSII Transactions on Internet & Information Systems, 2019, v. 13, n. 1, p. 437, doi. 10.3837/tiis.2019.01.024
- By:
- Publication type:
- Article
Priority visual secret sharing of random grids for threshold access structures.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 10, p. 11867, doi. 10.1007/s11042-017-4836-1
- By:
- Publication type:
- Article
Hide Text within a Video Using Data Encryption Standard (DES) Technology.
- Published in:
- SAR Journal (2619-9955), 2024, v. 7, n. 1, p. 24, doi. 10.18421/SAR71-04
- By:
- Publication type:
- Article
ENHANCING INFORMATION ENCRYPTION WITH BIOMOLECULAR SEQUENCES USING NDES ALGORITHM.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 9, p. 482, doi. 10.26483/ijarcs.v8i9.5006
- By:
- Publication type:
- Article
RANDOMIZED DES USING IRREDUCIBLE POLYNOMIAL OVER GALOIS FIELD GF(7<sup>3</sup>).
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 7, p. 760, doi. 10.26483/ijarcs.v8i7.4397
- By:
- Publication type:
- Article
Breaking of Simplified Data Encryption Standard Using Evolutionary Algorithm.
- Published in:
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 3, p. 384
- By:
- Publication type:
- Article
An Enhanced Approach for Security in Database Using Encryption Technology.
- Published in:
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 3, p. 361
- By:
- Publication type:
- Article
Image encryption algorithms based on wavelet decomposition and encryption of compressed data in wavelet domain.
- Published in:
- Przegląd Elektrotechniczny, 2018, v. 94, n. 2, p. 79, doi. 10.15199/48.2018.02.19
- By:
- Publication type:
- Article
A DATA ENCRYPTION STANDARD (DES) BASED WEB SERVICES SECURITY ARCHITECTURE.
- Published in:
- Annals. Computer Science Series, 2016, v. 14, n. 2, p. 53
- By:
- Publication type:
- Article
Evaluation of P2P and cloud computing as platform for exhaustive key search on block ciphers.
- Published in:
- Peer-to-Peer Networking & Applications, 2018, v. 11, n. 6, p. 1206, doi. 10.1007/s12083-018-0641-5
- By:
- Publication type:
- Article
Implementation of reconfigurable of DES and SM4 encryption algorithm.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 853, doi. 10.3969/j.issn.1001-3695.2014.03.052
- By:
- Publication type:
- Article
Performance Analysis of DCT Based Lossy Compression Method with Symmetrical Encryption Algorithms.
- Published in:
- EAI Endorsed Transactions on the Energy Web, 2020, n. 28, p. 1, doi. 10.4108/eai.13-7-2018.163976
- By:
- Publication type:
- Article
Comparative Study of Cryptographic Algorithms.
- Published in:
- International Journal of Information Security & Cybercrime, 2019, v. 8, n. 1, p. 13, doi. 10.19107/ijisc.2019.01.01
- By:
- Publication type:
- Article
Circuit and System Design for Optimal Lightweight AES Encryption on FPGA.
- Published in:
- IAENG International Journal of Computer Science, 2018, v. 45, n. 1, p. 136
- By:
- Publication type:
- Article
A Flexible Fully Homomorphic Encryption.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 2, p. 761, doi. 10.1007/s11277-016-3796-5
- By:
- Publication type:
- Article
A Compartive Study Between (AES) and (DES) Algorithms Based on the (SET) Protocol.
- Published in:
- Kirkuk University Journal for Scientific Studies, 2018, v. 13, n. 3, p. 64, doi. 10.32894/kujss.2018.13.3.6
- By:
- Publication type:
- Article