Academic literature on the topic 'Advanced Encryption Standard'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Advanced Encryption Standard.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Advanced Encryption Standard"

1

Wicaksana, Ismaya Khusnu, Panji Wisnu Wirawan, and Putut Sri Wasito. "Implementasi Pengamanan MP3 Menggunakan Advanced Encryption Standard." JURNAL MASYARAKAT INFORMATIKA 10, no. 1 (2019): 28–36. http://dx.doi.org/10.14710/jmasif.10.1.31491.

Full text
Abstract:
Format MP3 merupakan salah satu format suara yang populer. Format ini tidak memilikiimplementasi keamanan sehingga dapat menimbulkan beberapa dampak negatif. Salahsatu dampak negatifnya adalah resiko terhadap keamanan MP3 yang berisi informasirahasia. Kelemahan tersebut dapat dihilangkan dengan menerapkan proses enkripsipada file MP3. Algoritma kriptografi Advanced Encryption Standard (AES) dipilihkarena pada algoritma ini belum ditemukan celah keamanan, dipelihara dengan baikoleh NIST dan merupakan algoritma yang sering digunakan dalam implementasikeamanan. Implementasi Pengamanan MP3 Menggun
APA, Harvard, Vancouver, ISO, and other styles
2

Gaur, Paavni. "AES Image Encryption (Advanced Encryption Standard)." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (2021): 1357–63. http://dx.doi.org/10.22214/ijraset.2021.39542.

Full text
Abstract:
Abstract: An Image Encryption and Decryption Using AES (Advance Encryption Standard) Algorithm is proposed in the project. Due to increasing use of image in various field, it is very important to protect the confidential image data from unauthorized access. The design uses the iterative approach with block size of 128 bit and key size of 128, 192 or 256 bit. The numbers of round for key size of 256 bits is 14 , for 128 bits is 10 and for 192 bits is 12. As secret key increases the security as well as complexity of the cryptography algorithms. In this paper , an algorithm in which the image is
APA, Harvard, Vancouver, ISO, and other styles
3

Heron, Simon. "Advanced Encryption Standard (AES)." Network Security 2009, no. 12 (2009): 8–12. http://dx.doi.org/10.1016/s1353-4858(10)70006-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wright, Marie A. "The Advanced Encryption Standard." Network Security 2001, no. 10 (2001): 11–13. http://dx.doi.org/10.1016/s1353-4858(01)01018-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Stallings, William. "THE ADVANCED ENCRYPTION STANDARD." Cryptologia 26, no. 3 (2002): 165–88. http://dx.doi.org/10.1080/0161-110291890876.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

M. Shafiq Surameery, Nigar. "Modified Advanced Encryption Standard for Boost Image Encryption." UHD Journal of Science and Technology 6, no. 1 (2022): 52–59. http://dx.doi.org/10.21928/uhdjst.v6n1y2022.pp52-59.

Full text
Abstract:
Cryptography is a field of study that deals with converting data from a readable to an unreadable format. It can provide secrecy, data integrity, authenticity, and non-repudiation services. Security has become a concern for the community because of the technology’s potential use in numerous sectors of any company, market, agency, or governmental body, information. The cryptosystems ensure that data are transported securely and only authorized individuals have access to it. Deeply encrypted data that cannot be deciphered through cryptanalysis are in high demand right now. There are a variety of
APA, Harvard, Vancouver, ISO, and other styles
7

Et. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.

Full text
Abstract:
The emergence of cloud computing has completely changed the information technology sector, storage of information’s and access control. The main challenge in the migration of enterprises is the security to gain data owners confidence. In existing approach, many digital signatures based methodologies are used. In the existing approach, encryption time, security, encryption complexity are the parameters which need more focus. To overcome the existing issue, in this paper we proposed an hybrid architecture invoking attribute based encryption (ABE) for encrypting the key and advanced encryption st
APA, Harvard, Vancouver, ISO, and other styles
8

Alslman, Yasmeen, Eman Alnagi, Ashraf Ahmad, Yousef AbuHour, Remah Younisse, and Qasem Abu Al-haija. "Hybrid Encryption Scheme for Medical Imaging Using AutoEncoder and Advanced Encryption Standard." Electronics 11, no. 23 (2022): 3967. http://dx.doi.org/10.3390/electronics11233967.

Full text
Abstract:
Recently, medical image encryption has gained special attention due to the nature and sensitivity of medical data and the lack of effective image encryption using innovative encryption techniques. Several encryption schemes have been recommended and developed in an attempt to improve medical image encryption. The majority of these studies rely on conventional encryption techniques. However, such improvements have come with increased computational complexity and slower processing for encryption and decryption processes. Alternatively, the engagement of intelligent models such as deep learning a
APA, Harvard, Vancouver, ISO, and other styles
9

Kanshi, Avaneesh, Rajkumar Soundrapandiyan, V. S. Anita Sofia, and V. R. Rajasekar. "Hybridized Cryptographic Encryption and Decryption Using Advanced Encryption Standard and Data Encryption Standard." Cybernetics and Information Technologies 23, no. 4 (2023): 63–78. http://dx.doi.org/10.2478/cait-2023-0036.

Full text
Abstract:
Abstract This research proposes an efficient hybridized approach for symmetrical encryption of image files in bitmap formats. Due to the heavy use of lightweight encryption in fields such as military and corporate workplaces, intruders try to intercept communication through illegal means and gain access to classified information. This can result in heavy losses if the leaked image data is misused. The proposed enhances the security and efficiency of one of the most used standard symmetric algorithms, Advanced Encryption Standard (AES). In the proposed method, the AES architecture has been modi
APA, Harvard, Vancouver, ISO, and other styles
10

Yahia, Alemami, Afendee Mohamed Mohamad, and Atiewi Saleh. "Advanced approach for encryption using advanced encryption standard with chaotic map." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 1708–23. https://doi.org/10.11591/ijece.v13i2.pp1708-1723.

Full text
Abstract:
At present, security is significant for individuals and organizations. All information need security to prevent theft, leakage, alteration. Security must be guaranteed by applying some or combining cryptography algorithms to the information. Encipherment is the method that changes plaintext to a secure form called cipherment. Encipherment includes diverse types, such as symmetric and asymmetric encipherment. This study proposes an improved version of the advanced encryption standard (AES) algorithm called optimized advanced encryption standard (OAES). The OAES algorithm utilizes sine map and r
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Advanced Encryption Standard"

1

Chieco, Davide. "L'algoritmo advanced encryption standard (AES)." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/7274/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Maurer, Jennifer (Jennifer Robin) 1979. "Hardware implementation of the Advanced Encryption Standard." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/29732.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2003.<br>Includes bibliographical references (leaves 97-98).<br>This project implements a hardware solution to the Advanced Encryption Standard (AES) algorithm and interfaces to IBM's CoreConnect Bus Architecture. The project is IBM SoftCore compliant, is synthesized to the .18 micron CMOS double-well technology, runs at 133 MHz, and is approximately 706K for the 16x128 bit buffer implementation and 874K gates for the 32x128 bit buffer implementation. Data can be encrypted and decrypte
APA, Harvard, Vancouver, ISO, and other styles
3

Loban, H. "A VHDL Implemetation of the Advanced Encryption Standard." Thesis, NURE, MC&FPGA, 2019. https://mcfpga.nure.ua/conf/2019-mcfpga/10-35598-mcfpga-2019-014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sampath, Sowrirajan. "FPGA based Hardware Implementation of Advanced Encryption Standard." Wright State University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=wright1189835736.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mantzouris, Panteleimon. "Computational algebraic attacks on the Advanced Encryption Standard (AES)." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FMantzouris.pdf.

Full text
Abstract:
Thesis (M.S. in Electrical Engineering and M.S.in Applied Mathematics)--Naval Postgraduate School, September 2009.<br>Thesis Advisor(s): Canright, David ; Butler, Jon. "September 2009." Description based on title screen as viewed on 5 November 2009. Author(s) subject terms: Advanced Encryption Standard (AES), Rijndael's algorithm, block cipher, decipher, round of the algorithm, sparse multivariate polynomial. Includes bibliographical references (p. 101). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
6

Kosaraju, Naga M. "A VLSI Architecture for Rijndael, the Advanced Encryption Standard." [Tampa, Fla.] : University of South Florida, 2003. http://purl.fcla.edu/fcla/etd/SFE0000163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Schramm, Kai. "Advanced methods in Side Channel Cryptanalysis /." Berlin : Europäischer Univ.-Verl. [u.a.], 2006. http://deposit.d-nb.de/cgi-bin/dokserv?id=2902853&prov=M&dok_var=1&dok_ext=htm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jolfaei, Alireza. "Robust Encryption Schemes for 3D Content Protection." Thesis, Griffith University, 2016. http://hdl.handle.net/10072/367353.

Full text
Abstract:
Since the 1970s, a large number of encryption schemes have been proposed, among which some have been standardised and widely adopted all over the world, such as data encryption standard (DES) and advanced encryption standard (AES). However, due to the special features of three-dimensional (3D) content, these encryption standards are not a suitable solution for 3D ap- plications. The problem of 3D content encryption is beyond the application of established and well-known encryption algorithms. This is primarily due to the structure of 3D content and the way it is used commercially. Unlike data
APA, Harvard, Vancouver, ISO, and other styles
9

Tandon, Prateek. "High-performance advanced encryption standard (AES) security co-processor design." Thesis, Available online, Georgia Institute of Technology, 2004:, 2003. http://etd.gatech.edu/theses/available/etd-04082004-180433/unrestricted/tandon%5fprateek%5f200312%5fms.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Manteena, Rajender. "A VHDL implementation of the Advanced Encryption Standard-Rijndael Algorithm." [Tampa, Fla.] : University of South Florida, 2004. http://purl.fcla.edu/fcla/etd/SFE0000296.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Advanced Encryption Standard"

1

Dobbertin, Hans, Vincent Rijmen, and Aleksandra Sowa, eds. Advanced Encryption Standard – AES. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/b137765.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Information Technology Laboratory (National Institute of Standards and Technology). Announcing the Advanced Encryption Standard (AES). Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vasu, E. Critical evalutiona of advanced encryption standard: Rijndael. University of East London, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

National Institute of Standards and Technology (U.S.), ed. Randomness testing of the advanced encryption standard candidate algorithms. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

National Institute of Standards and Technology (U.S.), ed. Efficiency testing of ANSI C implementations of Round 1 candidate algorithms for the Advanced Encryption Standard. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Daemen, Joan, and Vincent Rijmen. Design of Rijndael: The Advanced Encryption Standard. Springer Berlin / Heidelberg, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Algebraic Aspects of the Advanced Encryption Standard. Springer US, 2006. http://dx.doi.org/10.1007/978-0-387-36842-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cid, Carlos, Matthew Robshaw, and Sean Murphy. Algebraic Aspects of the Advanced Encryption Standard. Springer London, Limited, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cid, Carlos, Sean Murphy, and Matthew J. B. Robshaw. Algebraic Aspects of the Advanced Encryption Standard. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

The Design of Rijndael: The Advanced Encryption Standard. Springer, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Advanced Encryption Standard"

1

Biham, Eli. "Advanced Encryption Standard." In Fast Software Encryption. Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0052336.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Miller, Michael. "Advanced Encryption Standard." In Symmetrische Verschlüsselungsverfahren. Vieweg+Teubner Verlag, 2003. http://dx.doi.org/10.1007/978-3-322-80101-2_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pelzl, Jan, and Christof Paar. "Der Advanced Encryption Standard." In Kryptografie verständlich. Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-49297-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Robertazzi, Thomas. "Advanced Encryption Standard (AES)." In Basics of Computer Networking. Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-2104-7_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wätjen, Dietmar. "Der Advanced Encryption Standard." In Kryptographie. Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-22474-5_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cid, Carlos. "Some Algebraic Aspects of the Advanced Encryption Standard." In Advanced Encryption Standard – AES. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11506447_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dobbertin, Hans, Lars Knudsen, and Matt Robshaw. "The Cryptanalysis of the AES – A Brief Survey." In Advanced Encryption Standard – AES. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11506447_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Trichina, Elena, Tymur Korkishko, and Kyung Hee Lee. "Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results." In Advanced Encryption Standard – AES. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11506447_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Van Le, Tri, Rüdiger Sparr, Ralph Wernsdorf, and Yvo Desmedt. "Complementation-Like and Cyclic Properties of AES Round Functions." In Advanced Encryption Standard – AES. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11506447_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Raddum, Håvard. "More Dual Rijndaels." In Advanced Encryption Standard – AES. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11506447_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Advanced Encryption Standard"

1

Mageshwaran, M. K., and P. Sri Ramya. "Data Protection in the Era of Big Data Advanced Encryption Standard VS Data Encryption Standard." In 2024 Second International Conference Computational and Characterization Techniques in Engineering & Sciences (IC3TES). IEEE, 2024. https://doi.org/10.1109/ic3tes62412.2024.10877503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Anbumani, V., N. Vikram, R. RajaRaja, G. P. Sanjeev, M. J. Varunesh, and D. K. Suhas. "Area-Efficient VLSI Architecture for Advanced Encryption Standard." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Qin, Jiawei, Yaobin Wang, Ling Li, Shuang Yang, and Xiaorong Zhang. "P-AES: Advanced Encryption Standard Parallel Optimization on MGPUSim." In 2024 IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA). IEEE, 2024. https://doi.org/10.1109/ispa63168.2024.00271.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bhatt, Chandradeep, Chirag Tiwari, Bhupesh Singh Thalal, Arpit Vishnoi, Karan Joshi, and Teekam Singh. "Secured Multi-Platform Communication Application Using Advanced Encryption Standard Algorithm." In 2024 10th International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE, 2024. http://dx.doi.org/10.1109/icaccs60874.2024.10716832.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nareswara, Muhammad Dzikri Pandu, Hilal Huda, and Sutiyo. "Secure Implementation of Population Data Encryption for Village Websites Using Advanced Encryption Standard (AES-256)." In 2024 IEEE 22nd Student Conference on Research and Development (SCOReD). IEEE, 2024. https://doi.org/10.1109/scored64708.2024.10872676.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Scripcariu, Luminiţa, and Florin Mocanu. "Enhanced Advanced Encryption Standard." In 2023 27th International Conference on System Theory, Control and Computing (ICSTCC). IEEE, 2023. http://dx.doi.org/10.1109/icstcc59206.2023.10308494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Alghazzawi, Daniyal M., Syed Hamid Hasan, and Mohamed Salim Trigui. "Advanced Encryption Standard - Cryptanalysis research." In 2014 International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, 2014. http://dx.doi.org/10.1109/indiacom.2014.6828045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Altigani, Abdelrahman, Shafaatunnur Hasan, Bazara Barry, and Siti Mariyam Shamsuddin. "Key-dependent Advanced Encryption Standard." In 2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE). IEEE, 2018. http://dx.doi.org/10.1109/iccceee.2018.8515761.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Saudagar, Saleha, Mukund Kulkarni, Anshuman Giramkar, et al. "Image Encryption based on Advanced Encryption Standard (AES)." In 2023 International Conference for Advancement in Technology (ICONAT). IEEE, 2023. http://dx.doi.org/10.1109/iconat57137.2023.10080243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sangwan, Chetna, Chetna Bhardwaj, Nisha, and Taruna Sikka. "VLSI Implementation of Advanced Encryption Standard." In Communication Technologies (ACCT). IEEE, 2012. http://dx.doi.org/10.1109/acct.2012.120.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Advanced Encryption Standard"

1

Foti, James. Advanced Encryption Standard (AES). National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.fips.197-upd1.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dworkin, Morris J. Advanced Encryption Standard (AES). National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.fips.197-upd1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mouha, Nicky. Review of the Advanced Encryption Standard. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.ir.8319.

Full text
Abstract:
The field of cryptography continues to advance at a very rapid pace, leading to new insights that may impact the security properties of cryptographic algorithms. The Crypto Publication Review Board ("the Board") has been established to identify publications to be reviewed. This report subjects the first standard to the review process: Federal Information Processing Standard (FIPS) 197, which defines the Advanced Encryption Standard (AES).
APA, Harvard, Vancouver, ISO, and other styles
4

Raeburn, K. Advanced Encryption Standard (AES) Encryption for Kerberos 5. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc3962.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Schaad, J., and R. Housley. Advanced Encryption Standard (AES) Key Wrap Algorithm. RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3394.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Harkins, D. Synthetic Initialization Vector (SIV) Authenticated Encryption Using the Advanced Encryption Standard (AES). RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Housley, R., and M. Dworkin. Advanced Encryption Standard (AES) Key Wrap with Padding Algorithm. RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5649.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Soto, Juan Jr. Randomness testing of the advanced encryption standard candidate algorithms. National Institute of Standards and Technology, 1999. http://dx.doi.org/10.6028/nist.ir.6390.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Soto, Juan, and Lawrence Bassham. Randomness testing of the advanced encryption standard finalist candidates. National Institute of Standards and Technology, 2000. http://dx.doi.org/10.6028/nist.ir.6483.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Schaad, J. Use of the Advanced Encryption Standard (AES) Encryption Algorithm in Cryptographic Message Syntax (CMS). RFC Editor, 2003. http://dx.doi.org/10.17487/rfc3565.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!