Journal articles on the topic 'Advanced Encryption Standard'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Advanced Encryption Standard.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wicaksana, Ismaya Khusnu, Panji Wisnu Wirawan, and Putut Sri Wasito. "Implementasi Pengamanan MP3 Menggunakan Advanced Encryption Standard." JURNAL MASYARAKAT INFORMATIKA 10, no. 1 (2019): 28–36. http://dx.doi.org/10.14710/jmasif.10.1.31491.
Full textGaur, Paavni. "AES Image Encryption (Advanced Encryption Standard)." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (2021): 1357–63. http://dx.doi.org/10.22214/ijraset.2021.39542.
Full textHeron, Simon. "Advanced Encryption Standard (AES)." Network Security 2009, no. 12 (2009): 8–12. http://dx.doi.org/10.1016/s1353-4858(10)70006-4.
Full textWright, Marie A. "The Advanced Encryption Standard." Network Security 2001, no. 10 (2001): 11–13. http://dx.doi.org/10.1016/s1353-4858(01)01018-2.
Full textStallings, William. "THE ADVANCED ENCRYPTION STANDARD." Cryptologia 26, no. 3 (2002): 165–88. http://dx.doi.org/10.1080/0161-110291890876.
Full textM. Shafiq Surameery, Nigar. "Modified Advanced Encryption Standard for Boost Image Encryption." UHD Journal of Science and Technology 6, no. 1 (2022): 52–59. http://dx.doi.org/10.21928/uhdjst.v6n1y2022.pp52-59.
Full textEt. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.
Full textAlslman, Yasmeen, Eman Alnagi, Ashraf Ahmad, Yousef AbuHour, Remah Younisse, and Qasem Abu Al-haija. "Hybrid Encryption Scheme for Medical Imaging Using AutoEncoder and Advanced Encryption Standard." Electronics 11, no. 23 (2022): 3967. http://dx.doi.org/10.3390/electronics11233967.
Full textKanshi, Avaneesh, Rajkumar Soundrapandiyan, V. S. Anita Sofia, and V. R. Rajasekar. "Hybridized Cryptographic Encryption and Decryption Using Advanced Encryption Standard and Data Encryption Standard." Cybernetics and Information Technologies 23, no. 4 (2023): 63–78. http://dx.doi.org/10.2478/cait-2023-0036.
Full textYahia, Alemami, Afendee Mohamed Mohamad, and Atiewi Saleh. "Advanced approach for encryption using advanced encryption standard with chaotic map." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 1708–23. https://doi.org/10.11591/ijece.v13i2.pp1708-1723.
Full textMurphy, Sean. "The Advanced Encryption Standard (AES)." Information Security Technical Report 4, no. 4 (1999): 12–17. http://dx.doi.org/10.1016/s1363-4127(99)80083-1.
Full textBurr, W. E. "Selecting the Advanced Encryption Standard." IEEE Security & Privacy 1, no. 2 (2003): 43–52. http://dx.doi.org/10.1109/msecp.2003.1193210.
Full textAher, Sandip R., and G. U. Kharat. "Area Optimized Advanced Encryption Standard." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 08 (2014): 1059–64. https://doi.org/10.5281/zenodo.14752167.
Full textAlemami, Yahia, Mohamad Afendee Mohamed, and Saleh Atiewi. "Advanced approach for encryption using advanced encryption standard with chaotic map." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 1708. http://dx.doi.org/10.11591/ijece.v13i2.pp1708-1723.
Full textTahir, Ari Shawkat. "A Modified Advanced Encryption Standard Algorithm for Image Encryption." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 11 (2015): 6258–67. http://dx.doi.org/10.24297/ijct.v14i11.1811.
Full textParenreng, Jumadi Mabe, Sahraeni Maulida Mustari, and Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm." Internet of Things and Artificial Intelligence Journal 2, no. 1 (2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.
Full textHasan, Hind Ali Abdul, Safaa Maijd Mohammed, and Noor Hayder Abdul Ameer. "ADVANCED ENCRYPTION STANDARD USING FPGA OVERNETWORK." EUREKA: Physics and Engineering, no. 1 (January 29, 2021): 32–39. http://dx.doi.org/10.21303/2461-4262.2021.001613.
Full textTaujuddin, Nik, Zaleha Noor, Zarina Tukiran, Mohd Abd Wahab, and Ariffin Abdul Mutalib. "Secured MyVirtualPDA using advanced encryption standard." IEEE Potentials 28, no. 1 (2009): 40–42. http://dx.doi.org/10.1109/mpot.2008.931161.
Full textMaolood, Abeer, and Yasser Yasser. "Modifying Advanced Encryption Standard (AES) Algorithm." Journal of Al-Rafidain University College For Sciences ( Print ISSN: 1681-6870 ,Online ISSN: 2790-2293 ), no. 3 (October 8, 2021): 259–85. http://dx.doi.org/10.55562/jrucs.v41i3.187.
Full textEmilselvan, G. s. r., N. Gayathri, S. Rakesh Kumar, Ankush Rai, and Jagadeesh Kannan R. "ADVANCED ENCRYPTION AND EXTENDED AUTHENTICATION FOR WIRELESS LAN." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (2017): 441. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19987.
Full textMiah, Md Shapan. "Introduction to Cryptography and Advanced Encryption Standard." International Journal of Research and Scientific Innovation XI, no. IX (2024): 776–83. http://dx.doi.org/10.51244/ijrsi.2024.1109065.
Full textSreeja and Kumar Sharma Mohit. "Advanced Encryption Standard (AES) and Hill Cipher: A Comparative Study." International Journal of Innovative Science and Research Technology 7, no. 12 (2023): 1983–85. https://doi.org/10.5281/zenodo.7553080.
Full textParthasarathy, Rajamohan, Seow Soon Loong, and Preethy Ayyappan. "An Efficient Encryption Implementation Using AES Algorithm Techniques." Journal of Engineering & Technological Advances 3, no. 1 (2018): 61–70. http://dx.doi.org/10.35934/segi.v3i1.61.
Full textBenchikh, Omar, Youcef Bentoutou, and Nasreddine Taleb. "Satellite image encryption using 2D standard map and advanced encryption standard with scrambling." International Journal of Electrical and Computer Engineering (IJECE) 14, no. 5 (2024): 5153. http://dx.doi.org/10.11591/ijece.v14i5.pp5153-5171.
Full textBhogal, Ranvir Singh, Baihua Li, Alastair Gale, and Yan Chen. "Medical Image Encryption using Chaotic Map Improved Advanced Encryption Standard." International Journal of Information Technology and Computer Science 10, no. 8 (2018): 1–10. http://dx.doi.org/10.5815/ijitcs.2018.08.01.
Full textZhang, Xiaoqiang, and Xuesong Wang. "Remote-Sensing Image Encryption Algorithm Using the Advanced Encryption Standard." Applied Sciences 8, no. 9 (2018): 1540. http://dx.doi.org/10.3390/app8091540.
Full textHeidilyn, V. Gamido. "Implementation of a bit permutation-based advanced encryption standard for securing text and image files." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (2020): 1596–601. https://doi.org/10.11591/ijeecs.v19.i3.pp1596-1601.
Full textMaheswara, A. A. Putu Priyamdeva Arya, Gusti Made Arya Sasmita, and A. A. Ketut Agung Cahyawan Wiranatha. "Perancangan Integrasi Sistem Enkripsi dan Steganografi untuk Pengamanan Data Suara Manusia Berbasis Web." JITTER : Jurnal Ilmiah Teknologi dan Komputer 5, no. 1 (2024): 2082. http://dx.doi.org/10.24843/jtrti.2024.v05.i01.p02.
Full textRAO, ATMAKURI KHANDESWARA. "Design Of Advanced Encryption Standard (AES) Algorithm Using Verilog." International Scientific Journal of Engineering and Management 04, no. 06 (2025): 1–9. https://doi.org/10.55041/isjem04678.
Full textGamido, Heidilyn V. "Implementation of a bit permutation-based advanced encryption standard for securing text and image files." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (2020): 1596. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1596-1601.
Full textG., Renuka, Usha Shree V., and Chandra Sekhar Reddy P. "Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microblaze Soft Core Processor." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 3544–49. https://doi.org/10.11591/ijece.v8i5.pp3544-3549.
Full textMonica, Taris, Asep Id Hadiana, and Melina Melina. "QUESTION BANK SECURITY USING RIVEST SHAMIR ADLEMAN ALGORITHM AND ADVANCED ENCRYPTION STANDARD." JIKO (Jurnal Informatika dan Komputer) 7, no. 3 (2024): 175–81. https://doi.org/10.33387/jiko.v7i3.8654.
Full textVijayabhasker, R. "Area Optimization in Masked Advanced Encryption Standard." IOSR Journal of Engineering 4, no. 6 (2014): 25–29. http://dx.doi.org/10.9790/3021-04612529.
Full textKarki, Ajit. "A Review on Advanced Encryption Standard (AES)." International Journal of Computer Sciences and Engineering 6, no. 8 (2018): 551–56. http://dx.doi.org/10.26438/ijcse/v6i8.551556.
Full textMenezes, Alfred, Douglas Stebila, Alfred Menezes, and Douglas Stebila. "The Advanced Encryption Standard: 20 Years Later." IEEE Security & Privacy 19, no. 6 (2021): 98–102. http://dx.doi.org/10.1109/msec.2021.3107078.
Full textPhan, R. C. W., and M. U. Siddiqi. "Generalised impossible differentials of advanced encryption standard." Electronics Letters 37, no. 14 (2001): 896. http://dx.doi.org/10.1049/el:20010619.
Full textChen, Jie, YuPu Hu, and YueYu Zhang. "Impossible differential cryptanalysis of Advanced Encryption Standard." Science in China Series F: Information Sciences 50, no. 3 (2007): 342–50. http://dx.doi.org/10.1007/s11432-007-0035-4.
Full textWright, Marie A. "The evolution of the Advanced Encryption Standard." Network Security 1999, no. 11 (1999): 11–14. http://dx.doi.org/10.1016/s1353-4858(00)80004-5.
Full textForte, Dario. "The future of the advanced encryption standard." Network Security 1999, no. 6 (1999): 10–13. http://dx.doi.org/10.1016/s1353-4858(00)80016-1.
Full textJegadish, K. J., and R. Balasubramanian. "Lightweight Mixcolumn Architecture for Advanced Encryption Standard." International Journal of Computer Applications 136, no. 11 (2016): 31–36. http://dx.doi.org/10.5120/ijca2016908583.
Full textKARA, ORHUN. "Lower data attacks on Advanced Encryption Standard." Turkish Journal of Electrical Engineering and Computer Sciences 32, no. 2 (2024): 338–57. http://dx.doi.org/10.55730/1300-0632.4072.
Full textB, N. Divya, Davana N, Dhanushree K, Apoorva V, and Anusha V. "Design and Implementation of Advanced Encryption Standard." Perspectives in Communication, Embedded-systems and Signal-processing - PiCES 5, no. 7 (2021): 68–72. https://doi.org/10.5281/zenodo.5762122.
Full textHussien, Marwah K. "Encryption of Stereo Images after Compression by Advanced Encryption Standard (AES)." Al-Mustansiriyah Journal of Science 28, no. 2 (2018): 156. http://dx.doi.org/10.23851/mjs.v28i2.511.
Full textMokhtar, M. Amr. "High Performance Data Encryption based on Advanced Encryption Standard using FPGA." IOSR Journal of Computer Engineering 16, no. 6 (2014): 07–13. http://dx.doi.org/10.9790/0661-16650713.
Full textAnsh Goel, Harshit Baliyan, Shivam Tyagi, and Neeti Bansal. "End to end encryption of chat using advanced encryption standard-256." International Journal of Science and Research Archive 12, no. 1 (2024): 2018–25. http://dx.doi.org/10.30574/ijsra.2024.12.1.0923.
Full textTerisha Sheline Shazhaq, Muhlis Tahir, Khoirul Amin Abidin, et al. "Analisa Penyandian File Dokumen Kriptografi Menggunakan Advanced Encryption Standard (AES)." Jurnal Kendali Teknik dan Sains 1, no. 2 (2023): 103–15. http://dx.doi.org/10.59581/jkts-widyakarya.v1i2.314.
Full textK, Roslin Dayana. "ELLIPTICAL ADVANCED ENCRYPTION STANDARD - MODERN CRYPTOGRAPHY FOR SECURE DATA COMMUNICATION." ICTACT Journal on Communication Technology 15, no. 4 (2024): 3351–57. https://doi.org/10.21917/ijct.2024.0497.
Full textShafiq, Sobia, Sohaib Latif, Jawad Ibrahim, et al. "Optimizing video data security: A hybrid MAES-ECC encryption technique for efficient internet transmission." PLOS ONE 19, no. 11 (2024): e0311765. http://dx.doi.org/10.1371/journal.pone.0311765.
Full textDilshad Akhtar, Neda Fatma, M. R. Hassan,. "Incorporating the New PRNG in Advance Encryption Standard." Proceeding International Conference on Science and Engineering 11, no. 1 (2023): 1841–53. http://dx.doi.org/10.52783/cienceng.v11i1.344.
Full textKasiran, Zolidah, Hikma Farah Ali, and Noorhayati Mohamed Noor. "Time performance analysis of advanced encryption standard and data encryption standard in data security transaction." Indonesian Journal of Electrical Engineering and Computer Science 16, no. 2 (2019): 988. http://dx.doi.org/10.11591/ijeecs.v16.i2.pp988-994.
Full text