Academic literature on the topic 'AES-256 Encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'AES-256 Encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "AES-256 Encryption"
Wade, Sahil. "Description of Image encryption Using AES-256 bits." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 7167–71. http://dx.doi.org/10.22214/ijraset.2023.53365.
Full textShinde, K. A. "Pretty Good Privacy on Online Shopping." International Scientific Journal of Engineering and Management 04, no. 05 (2025): 1–7. https://doi.org/10.55041/isjem03360.
Full textAnsh Goel, Harshit Baliyan, Shivam Tyagi, and Neeti Bansal. "End to end encryption of chat using advanced encryption standard-256." International Journal of Science and Research Archive 12, no. 1 (2024): 2018–25. http://dx.doi.org/10.30574/ijsra.2024.12.1.0923.
Full textGaur, Paavni. "AES Image Encryption (Advanced Encryption Standard)." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (2021): 1357–63. http://dx.doi.org/10.22214/ijraset.2021.39542.
Full textArek Satria, Bagas Piwari, and Tata Sutarbi. "Implementasi Algoritma Kriptografi AES untuk Keamanan Data pada Aplikasi Pesan Instan Berbasis Android." Jurnal Ilmiah Teknik Informatika dan Komunikasi 5, no. 2 (2025): 541–47. https://doi.org/10.55606/juitik.v5i2.1167.
Full textRavikiran, Dr P., M. Gnaneshwar, Enje Hepsibha, and Sudhesh Srivastav. "FPGA Implementation of 256-Bit Key AES Algorithm." International Journal for Research in Applied Science and Engineering Technology, no. 6 (June 30, 2024): 282–91. http://dx.doi.org/10.22214/ijraset.2024.63028.
Full textMonica, Taris, Asep Id Hadiana, and Melina Melina. "QUESTION BANK SECURITY USING RIVEST SHAMIR ADLEMAN ALGORITHM AND ADVANCED ENCRYPTION STANDARD." JIKO (Jurnal Informatika dan Komputer) 7, no. 3 (2024): 175–81. https://doi.org/10.33387/jiko.v7i3.8654.
Full textShivangi, Wadehra, Goel Shivam, and Sengar Nidhi. "AES Algorithm Encryption and Decryption." International Journal of Trend in Scientific Research and Development 2, no. 3 (2019): 1075–77. https://doi.org/10.31142/ijtsrd11221.
Full textPatil, Paritosh S. "New Encryption Technique for Secure SMS Transmission." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 11 (2014): 1265–69. https://doi.org/10.5281/zenodo.14759441.
Full textPutra, Jessa Syah, Rian Ardianto, and Purwono Purwono. "Tinjauan Terhadap Implementasi Advanced Encryption Standard 256 Dalam Keamanan Data." DEVICE : JOURNAL OF INFORMATION SYSTEM, COMPUTER SCIENCE AND INFORMATION TECHNOLOGY 5, no. 2 (2024): 335–55. https://doi.org/10.46576/device.v5i2.4621.
Full textBook chapters on the topic "AES-256 Encryption"
Li, Leibo, Keting Jia, and Xiaoyun Wang. "Improved Single-Key Attacks on 9-Round AES-192/256." In Fast Software Encryption. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46706-0_7.
Full textKishor Kumar, R., M. H. Yogesh, K. Raghavendra Prasad, Sharankumar, and S. Sabareesh. "256-Bit AES Encryption Using SubBytes Blocks Optimisation." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-7954-7_56.
Full textGeetha, N., and K. Mahesh. "RGB Component Encryption of Video Using AES-256 Bit Key." In Lecture Notes on Data Engineering and Communications Technologies. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24643-3_83.
Full textRajangam, Vijayarajan, Shani S. Kumar, Sathiya Narayanan, Sangeetha N., and Avudaiammal R. "Medical Image Encryption Using Distance-Based Biokey Generation." In Advances in Digital Crime, Forensics, and Cyber Terrorism. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-4558-7.ch009.
Full textDatta, Aparna, and Sanchayan Sen. "A Security and Privacy Validation Methodology for E-Health Systems Using Cloud Storage." In Advances in Human and Social Aspects of Technology. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-9235-5.ch009.
Full textPakhomchik, Alexey, and Valerii Vinokur. "Potential Vulnerabilities of Cryptoalgorithms in the World of Ideal Quantum Annealers." In The Role of Cybersecurity in the Industry 5.0 Era [Working Title]. IntechOpen, 2024. http://dx.doi.org/10.5772/intechopen.114973.
Full textAmmari, Faisal Tawfiq, and Joan Lu. "Securing Financial XML Transactions Using Intelligent Fuzzy Classification Techniques." In Securing the Internet of Things. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9866-4.ch039.
Full textAmmari, Faisal Tawfiq, and Joan Lu. "Securing Financial XML Transactions Using Intelligent Fuzzy Classification Techniques." In Ontologies and Big Data Considerations for Effective Intelligence. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-2058-0.ch007.
Full textDyriavko, Oleh. "MODELS AND SOFTWARE TOOLS FOR FORECASTING AND MANAGING FINANCIAL RISKS." In Science, technology and innovation in the context of global transformation. Publishing House “Baltija Publishing”, 2024. https://doi.org/10.30525/978-9934-26-499-3-8.
Full textConference papers on the topic "AES-256 Encryption"
Nareswara, Muhammad Dzikri Pandu, Hilal Huda, and Sutiyo. "Secure Implementation of Population Data Encryption for Village Websites Using Advanced Encryption Standard (AES-256)." In 2024 IEEE 22nd Student Conference on Research and Development (SCOReD). IEEE, 2024. https://doi.org/10.1109/scored64708.2024.10872676.
Full textS, Akash, and S. Gokila. "Secure Multi-Factor One-Time Password Generation using PyOTP, SHA-512, and AES-256 Encryption." In 2025 Third International Conference on Augmented Intelligence and Sustainable Systems (ICAISS). IEEE, 2025. https://doi.org/10.1109/icaiss61471.2025.11041781.
Full textRajab, Aufa Yuslizar, Windarto, Achmad Solichin, Mohammad Syafrullah, Hendri Irawan, and Lauw Li Hin. "Implementation of Advanced Encryption Standard (AES) 256 Algorithm on WEB Based Application for Protecting Sensitive Data on MIKROTIK CCR 1009 VPNIP Device." In 2024 International Conference on Intelligent Cybernetics Technology & Applications (ICICyTA). IEEE, 2024. https://doi.org/10.1109/icicyta64807.2024.10912985.
Full textAlkhyeli, Mohammed, Shaheen Alkhyeli, Khalifa Aldhaheri, and Hanane Lamaazi. "Secure Chat Room Application Using AES-GCM Encryption and SHA-256." In 2023 15th International Conference on Innovations in Information Technology (IIT). IEEE, 2023. http://dx.doi.org/10.1109/iit59782.2023.10366418.
Full textHashim, Jibran, Arsalan Hameed, Muhammad Jamshed Abbas, Muhammad Awais, Hassaan Aziz Qazi, and Sohail Abbas. "LSB Modification based Audio Steganography using Advanced Encryption Standard (AES-256) Technique." In 2018 12th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS). IEEE, 2018. http://dx.doi.org/10.1109/macs.2018.8628458.
Full textAmelia, Fetty, and Muhammad Fahmi Ramadhani. "LoRa-Based Asset Tracking System with Data Encryption Using AES-256 Algorithm." In 2022 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET). IEEE, 2022. http://dx.doi.org/10.1109/icramet56917.2022.9991210.
Full textKhairunisa, Isma, and Herman Kabetta. "PHP Source Code Protection Using Layout Obfuscation and AES-256 Encryption Algorithm." In 2021 6th International Workshop on Big Data and Information Security (IWBIS). IEEE, 2021. http://dx.doi.org/10.1109/iwbis53353.2021.9631842.
Full textYumang, Analyn N., Ericson D. Dimaunahan, Clifford Khyle M. Centino, and Adrian Robert J. Doroteo. "IoT-based Fire Mitigation and Detection System with AES-256 Encryption and Android Application." In 2023 2nd International Symposium on Sensor Technology and Control (ISSTC). IEEE, 2023. http://dx.doi.org/10.1109/isstc59603.2023.10281116.
Full textAndriani, Ria, Stevi Ema Wijayanti, and Ferry Wahyu Wibowo. "Comparision Of AES 128, 192 And 256 Bit Algorithm For Encryption And Description File." In 2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE). IEEE, 2018. http://dx.doi.org/10.1109/icitisee.2018.8720983.
Full textRapolu, Ravi Teja, Madhavaram Krishna Gopal, and GAE Satish Kumar. "A Secure method for Image Signaturing using SHA-256, RSA, and Advanced Encryption Standard (AES)." In 2022 IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE). IEEE, 2022. http://dx.doi.org/10.1109/icdcece53908.2022.9792989.
Full text