Academic literature on the topic 'Advance Encryption Standard'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Advance Encryption Standard.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Advance Encryption Standard"

1

Gaur, Paavni. "AES Image Encryption (Advanced Encryption Standard)." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (2021): 1357–63. http://dx.doi.org/10.22214/ijraset.2021.39542.

Full text
Abstract:
Abstract: An Image Encryption and Decryption Using AES (Advance Encryption Standard) Algorithm is proposed in the project. Due to increasing use of image in various field, it is very important to protect the confidential image data from unauthorized access. The design uses the iterative approach with block size of 128 bit and key size of 128, 192 or 256 bit. The numbers of round for key size of 256 bits is 14 , for 128 bits is 10 and for 192 bits is 12. As secret key increases the security as well as complexity of the cryptography algorithms. In this paper , an algorithm in which the image is
APA, Harvard, Vancouver, ISO, and other styles
2

Dilshad Akhtar, Neda Fatma, M. R. Hassan,. "Incorporating the New PRNG in Advance Encryption Standard." Proceeding International Conference on Science and Engineering 11, no. 1 (2023): 1841–53. http://dx.doi.org/10.52783/cienceng.v11i1.344.

Full text
Abstract:
This manuscript explores the fusion of two well-known encryption algorithms, the Advanced Encryption Standard (AES) and the Rivest Cipher (RC4), resulting in a novel encryption algorithm called AES-RC4. AES-RC4 is a block cipher that combines the strengths of AES with a variant of RC4 called RC4-GF, developed by ourselves. RC4-GF incorporates additional steps compared to AES, resulting in a more intricate ciphertext generation process.
 The introduction of AES-RC4 brings forth a highly secure encryption technique with increased complexity in the ciphertext compared to traditional AES. By
APA, Harvard, Vancouver, ISO, and other styles
3

Ali, Moch Dzikri Azhari, Asep Id Hadiana, and Melina Melina. "Securing Network Log Data Using Advance Encryption Standard Algorithm And Twofish With Common Event Format." International Journal of Quantitative Research and Modeling 5, no. 3 (2024): 341–53. https://doi.org/10.46336/ijqrm.v5i3.757.

Full text
Abstract:
The rapid advancement of information technology demands enhanced security for data exchange in the digital world. Network security threats can arise from various sources, necessitating techniques to protect information transmitted between interconnected networks. Securing network logs is a critical step in strengthening overall network security. Network logs are records of activities within a computer network, including unauthorized access attempts, user activities, and other key events. This research focuses on developing a network log security system by comparing the performance of the Advan
APA, Harvard, Vancouver, ISO, and other styles
4

Edwin, R. Arboleda, Eunice R. Fenomeno Carla, and Z. Jimenez Joshua. "KED-AES algorithm: combined key encryption decryption and advance encryption standard algorithm." International Journal of Advances in Applied Sciences (IJAAS) 8, no. 1 (2019): 44–53. https://doi.org/10.11591/ijaas.v8.i1.pp44-53.

Full text
Abstract:
Two existing cryptosystems are being combined and proposed. It is the enhanced combination of KED (Key Encryption Decryption), a cryptosystem that uses modulo 69 and the AES (Advance Encryption Standard) cryptography. The strength of the KED is that the keys are being used by the sender and the receiving end. The AES is easy to implement and has good defense against various attacks such as hacking.
APA, Harvard, Vancouver, ISO, and other styles
5

Sharma, Ankit, Shashank Gupta, and Shashi Kant Rathore. "Proposal for Portable Approach in Advance Encryption Standard." International Journal of Computer Applications 69, no. 28 (2013): 35–40. http://dx.doi.org/10.5120/12251-8522.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kasiran, Zolidah, Shapina Abdullah, and Normazlie Mohd Nor. "An advance encryption standard cryptosystem in IoT transaction." Indonesian Journal of Electrical Engineering and Computer Science 17, no. 3 (2020): 1548. http://dx.doi.org/10.11591/ijeecs.v17.i3.pp1548-1554.

Full text
Abstract:
IoT create an ecosystem that can be useful to the world with its various services. That make the security of IoT is more important. This paper presents a proposed technique to secure data transaction from IoT device to other node using cryptography technique. AES cryptography and IoT device model ESP8266 is used as a client to send data to a server via HTTP protocol. Security performance matrices used eavesdropping attack with Wireshark sniffing and brute-force attack. will be simulated to the proposed method in order to ensure if there is any possibility it can be cracked using those attacks
APA, Harvard, Vancouver, ISO, and other styles
7

Zolidah, Kasiran, Abdullah Shapina, and Mohd Nor Normazlie. "An advance encryption standard cryptosystem in iot transaction." Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 17, no. 3 (2020): 1548–54. https://doi.org/10.11591/ijeecs.v17.i3.pp1548-1554.

Full text
Abstract:
IoT create an ecosystem that can be useful to the world with its various services. That make the security of IoT is more important. This paper presents a proposed technique to secure data transaction from IoT device to other node using cryptography technique. AES cryptography and IoT device model ESP8266 is used as a client to send data to a server via HTTP protocol. Security performance matrices used eavesdropping attack with Wireshark sniffing and brute-force attack. will be simulated to the proposed method in order to ensure if there is any possibility it can be cracked using those attacks
APA, Harvard, Vancouver, ISO, and other styles
8

Arboleda, Edwin Romeroso, Carla Eunice R. Fenomeno, and Joshua Z. Jimenez. "KED-AES algorithm: combined key encryption decryption and advance encryption standard algorithm." International Journal of Advances in Applied Sciences 8, no. 1 (2019): 44. http://dx.doi.org/10.11591/ijaas.v8.i1.pp44-53.

Full text
Abstract:
<p>Two existing cryptosystems are being combined and proposed. It is the enhanced combination of KED (Key Encryption Decryption), a cryptosystem that uses modulo 69 and the AES (Advance Encryption Standard) cryptography. The strength of the KED is that the keys are being used by the sender and the receiving end. The AES is easy to implement and has good defense against various attacks such as hacking.</p>
APA, Harvard, Vancouver, ISO, and other styles
9

ANUSHA, GUNTURU, P. SOWMYA, SHAHANA MUSKAAN, and S. DEEPIKA. "SECURE NRF WIRELESS COMMUNICATION FOR DATA ENCRYPTION." Industrial Engineering Journal 53, no. 12 (2024): 149–53. https://doi.org/10.36893/iej.2024.v53i12.019.

Full text
Abstract:
In this work, the design and implementation of secured communication in a wireless network was achieved. The design was accomplished by using a Modified Advance Encryption Standard (MAES) algorithm and visual studio. A byte rotation technique was used to modify the Advance encryption standard in order to improve security of files over a wireless network. In the work, files were encrypted such that if they fall in the hands of unauthorized users, their content remains secured because MAES was used to encrypt them. Binary files of different formats and sizes were used to test the design, and fil
APA, Harvard, Vancouver, ISO, and other styles
10

Hasan, Hind Ali Abdul, Safaa Maijd Mohammed, and Noor Hayder Abdul Ameer. "ADVANCED ENCRYPTION STANDARD USING FPGA OVERNETWORK." EUREKA: Physics and Engineering, no. 1 (January 29, 2021): 32–39. http://dx.doi.org/10.21303/2461-4262.2021.001613.

Full text
Abstract:
The increase number of eavesdropping or cracker to attack the information and hack the privacy of people. So, the essential issue is making system capable of ciphering information with rapid speed. Due to the advance in computer eavesdropping and cracker that made them to analysis the way of ciphering in rapid speed way. The development in the computer especially in the rapid processer in the last decade create the breaching of any system is a matter of time. Owing to most of breaching ways are based on analysis of system that requireы to be breached and to try brute force on that system to cr
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Advance Encryption Standard"

1

Chieco, Davide. "L'algoritmo advanced encryption standard (AES)." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/7274/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Maurer, Jennifer (Jennifer Robin) 1979. "Hardware implementation of the Advanced Encryption Standard." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/29732.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2003.<br>Includes bibliographical references (leaves 97-98).<br>This project implements a hardware solution to the Advanced Encryption Standard (AES) algorithm and interfaces to IBM's CoreConnect Bus Architecture. The project is IBM SoftCore compliant, is synthesized to the .18 micron CMOS double-well technology, runs at 133 MHz, and is approximately 706K for the 16x128 bit buffer implementation and 874K gates for the 32x128 bit buffer implementation. Data can be encrypted and decrypte
APA, Harvard, Vancouver, ISO, and other styles
3

Loban, H. "A VHDL Implemetation of the Advanced Encryption Standard." Thesis, NURE, MC&FPGA, 2019. https://mcfpga.nure.ua/conf/2019-mcfpga/10-35598-mcfpga-2019-014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sampath, Sowrirajan. "FPGA based Hardware Implementation of Advanced Encryption Standard." Wright State University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=wright1189835736.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jolfaei, Alireza. "Robust Encryption Schemes for 3D Content Protection." Thesis, Griffith University, 2016. http://hdl.handle.net/10072/367353.

Full text
Abstract:
Since the 1970s, a large number of encryption schemes have been proposed, among which some have been standardised and widely adopted all over the world, such as data encryption standard (DES) and advanced encryption standard (AES). However, due to the special features of three-dimensional (3D) content, these encryption standards are not a suitable solution for 3D ap- plications. The problem of 3D content encryption is beyond the application of established and well-known encryption algorithms. This is primarily due to the structure of 3D content and the way it is used commercially. Unlike data
APA, Harvard, Vancouver, ISO, and other styles
6

Mantzouris, Panteleimon. "Computational algebraic attacks on the Advanced Encryption Standard (AES)." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FMantzouris.pdf.

Full text
Abstract:
Thesis (M.S. in Electrical Engineering and M.S.in Applied Mathematics)--Naval Postgraduate School, September 2009.<br>Thesis Advisor(s): Canright, David ; Butler, Jon. "September 2009." Description based on title screen as viewed on 5 November 2009. Author(s) subject terms: Advanced Encryption Standard (AES), Rijndael's algorithm, block cipher, decipher, round of the algorithm, sparse multivariate polynomial. Includes bibliographical references (p. 101). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
7

Kosaraju, Naga M. "A VLSI Architecture for Rijndael, the Advanced Encryption Standard." [Tampa, Fla.] : University of South Florida, 2003. http://purl.fcla.edu/fcla/etd/SFE0000163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schramm, Kai. "Advanced methods in Side Channel Cryptanalysis /." Berlin : Europäischer Univ.-Verl. [u.a.], 2006. http://deposit.d-nb.de/cgi-bin/dokserv?id=2902853&prov=M&dok_var=1&dok_ext=htm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tandon, Prateek. "High-performance advanced encryption standard (AES) security co-processor design." Thesis, Available online, Georgia Institute of Technology, 2004:, 2003. http://etd.gatech.edu/theses/available/etd-04082004-180433/unrestricted/tandon%5fprateek%5f200312%5fms.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Manteena, Rajender. "A VHDL implementation of the Advanced Encryption Standard-Rijndael Algorithm." [Tampa, Fla.] : University of South Florida, 2004. http://purl.fcla.edu/fcla/etd/SFE0000296.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Advance Encryption Standard"

1

Dobbertin, Hans, Vincent Rijmen, and Aleksandra Sowa, eds. Advanced Encryption Standard – AES. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/b137765.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Information Technology Laboratory (National Institute of Standards and Technology). Announcing the Advanced Encryption Standard (AES). Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vasu, E. Critical evalutiona of advanced encryption standard: Rijndael. University of East London, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

National Institute of Standards and Technology (U.S.), ed. Randomness testing of the advanced encryption standard candidate algorithms. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

National Institute of Standards and Technology (U.S.), ed. Efficiency testing of ANSI C implementations of Round 1 candidate algorithms for the Advanced Encryption Standard. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Algebraic Aspects of the Advanced Encryption Standard (Advances in Information Security). Springer, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Daemen, Joan, and Vincent Rijmen. Design of Rijndael: The Advanced Encryption Standard. Springer Berlin / Heidelberg, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Algebraic Aspects of the Advanced Encryption Standard. Springer US, 2006. http://dx.doi.org/10.1007/978-0-387-36842-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cid, Carlos, Matthew Robshaw, and Sean Murphy. Algebraic Aspects of the Advanced Encryption Standard. Springer London, Limited, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cid, Carlos, Sean Murphy, and Matthew J. B. Robshaw. Algebraic Aspects of the Advanced Encryption Standard. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Advance Encryption Standard"

1

Sharma, Vijay Kumar, and Devesh Kumar Srivastava. "Comprehensive Data Hiding Technique for Discrete Wavelet Transform-Based Image Steganography Using Advance Encryption Standard." In Lecture Notes in Networks and Systems. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3935-5_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Biham, Eli. "Advanced Encryption Standard." In Fast Software Encryption. Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0052336.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Miller, Michael. "Advanced Encryption Standard." In Symmetrische Verschlüsselungsverfahren. Vieweg+Teubner Verlag, 2003. http://dx.doi.org/10.1007/978-3-322-80101-2_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pelzl, Jan, and Christof Paar. "Der Advanced Encryption Standard." In Kryptografie verständlich. Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-49297-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Robertazzi, Thomas. "Advanced Encryption Standard (AES)." In Basics of Computer Networking. Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-2104-7_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wätjen, Dietmar. "Der Advanced Encryption Standard." In Kryptographie. Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-22474-5_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cid, Carlos. "Some Algebraic Aspects of the Advanced Encryption Standard." In Advanced Encryption Standard – AES. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11506447_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dobbertin, Hans, Lars Knudsen, and Matt Robshaw. "The Cryptanalysis of the AES – A Brief Survey." In Advanced Encryption Standard – AES. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11506447_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Trichina, Elena, Tymur Korkishko, and Kyung Hee Lee. "Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results." In Advanced Encryption Standard – AES. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11506447_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Van Le, Tri, Rüdiger Sparr, Ralph Wernsdorf, and Yvo Desmedt. "Complementation-Like and Cyclic Properties of AES Round Functions." In Advanced Encryption Standard – AES. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11506447_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Advance Encryption Standard"

1

Bisht, Neeraj, Bishwajeet Kumar Pandey, and Sandeep Kumar Budhani. "Comparative Performance Analysis of Kintex-7 Low Voltage and Kintex UltraScale Technology for Advance Encryption Standard." In 2024 International Conference on Signal Processing and Advance Research in Computing (SPARC). IEEE, 2024. https://doi.org/10.1109/sparc61891.2024.10829109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mageshwaran, M. K., and P. Sri Ramya. "Data Protection in the Era of Big Data Advanced Encryption Standard VS Data Encryption Standard." In 2024 Second International Conference Computational and Characterization Techniques in Engineering & Sciences (IC3TES). IEEE, 2024. https://doi.org/10.1109/ic3tes62412.2024.10877503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Anbumani, V., N. Vikram, R. RajaRaja, G. P. Sanjeev, M. J. Varunesh, and D. K. Suhas. "Area-Efficient VLSI Architecture for Advanced Encryption Standard." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Qin, Jiawei, Yaobin Wang, Ling Li, Shuang Yang, and Xiaorong Zhang. "P-AES: Advanced Encryption Standard Parallel Optimization on MGPUSim." In 2024 IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA). IEEE, 2024. https://doi.org/10.1109/ispa63168.2024.00271.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sagheer, Ali M., Salah S. Al-Rawi, and Omar A. Dawood. "Proposing of Developed Advance Encryption Standard." In 2011 Developments in E-systems Engineering (DeSE). IEEE, 2011. http://dx.doi.org/10.1109/dese.2011.74.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dhall, Sakshi, Swekriti Sharma, and Saibal K. Pal. "Improved Media Security using Customized Standard Encryption Schemes." In 2009 IEEE International Advance Computing Conference (IACC 2009). IEEE, 2009. http://dx.doi.org/10.1109/iadcc.2009.4809117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kaur, Jagpreet, Shweta Lamba, and Preeti Saini. "Advanced Encryption Standard: Attacks and Current Research Trends." In 2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). IEEE, 2021. http://dx.doi.org/10.1109/icacite51222.2021.9404716.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vaidya, Nupur D., Yogesh A. Suryawanshi, and Manish Chavan. "Design for enhancing the performance of Advance Encryption Standard algorithm VHDL." In 2016 Online International Conference on Green Engineering and Technologies (IC-GET). IEEE, 2016. http://dx.doi.org/10.1109/get.2016.7916849.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Anajemba, Joseph Henry, Celestine Iwendi, Mohit Mittal, and Tang Yue. "Improved Advance Encryption Standard with a Privacy Database Structure for IoT Nodes." In 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2020. http://dx.doi.org/10.1109/csnt48778.2020.9115741.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Umar Talha, S. M., Mir Asif, Hammad Hussain, Ali Asghar, and Hadi Ameen. "Efficient advance encryption standard (AES) implementation on FPGA using Xilinx system generator." In 2016 6th International Conference on Intelligent and Advanced Systems (ICIAS). IEEE, 2016. http://dx.doi.org/10.1109/icias.2016.7824144.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Advance Encryption Standard"

1

Mouha, Nicky. Review of the Advanced Encryption Standard. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.ir.8319.

Full text
Abstract:
The field of cryptography continues to advance at a very rapid pace, leading to new insights that may impact the security properties of cryptographic algorithms. The Crypto Publication Review Board ("the Board") has been established to identify publications to be reviewed. This report subjects the first standard to the review process: Federal Information Processing Standard (FIPS) 197, which defines the Advanced Encryption Standard (AES).
APA, Harvard, Vancouver, ISO, and other styles
2

Foti, James. Advanced Encryption Standard (AES). National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.fips.197-upd1.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dworkin, Morris J. Advanced Encryption Standard (AES). National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.fips.197-upd1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Raeburn, K. Advanced Encryption Standard (AES) Encryption for Kerberos 5. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc3962.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sonmez Turan, Meltem. Ascon-Based Lightweight Cryptography Standards for Constrained Devices. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.sp.800-232.

Full text
Abstract:
In 2023, the National Institute of Standards and Technology (NIST) announced the selection of the Ascon family of algorithms designed by Dobraunig, Eichlseder, Mendel, and Schläffer to provide efficient cryptographic solutions for resource-constrained devices. This decision emerged from a rigorous, multi-round lightweight cryptography standardization process. The Ascon family includes a suite of cryptographic primitives that provide Authenticated Encryption with Associated Data (AEAD), hash function, and eXtendable Output Function (XOF) capabilities. The Ascon family is characterized by lightw
APA, Harvard, Vancouver, ISO, and other styles
6

Schaad, J., and R. Housley. Advanced Encryption Standard (AES) Key Wrap Algorithm. RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3394.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Harkins, D. Synthetic Initialization Vector (SIV) Authenticated Encryption Using the Advanced Encryption Standard (AES). RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schaad, J. Use of the Advanced Encryption Standard (AES) Encryption Algorithm in Cryptographic Message Syntax (CMS). RFC Editor, 2003. http://dx.doi.org/10.17487/rfc3565.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Housley, R., and M. Dworkin. Advanced Encryption Standard (AES) Key Wrap with Padding Algorithm. RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5649.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Soto, Juan Jr. Randomness testing of the advanced encryption standard candidate algorithms. National Institute of Standards and Technology, 1999. http://dx.doi.org/10.6028/nist.ir.6390.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!