Journal articles on the topic 'AES-256 Encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'AES-256 Encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wade, Sahil. "Description of Image encryption Using AES-256 bits." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 7167–71. http://dx.doi.org/10.22214/ijraset.2023.53365.
Full textShinde, K. A. "Pretty Good Privacy on Online Shopping." International Scientific Journal of Engineering and Management 04, no. 05 (2025): 1–7. https://doi.org/10.55041/isjem03360.
Full textAnsh Goel, Harshit Baliyan, Shivam Tyagi, and Neeti Bansal. "End to end encryption of chat using advanced encryption standard-256." International Journal of Science and Research Archive 12, no. 1 (2024): 2018–25. http://dx.doi.org/10.30574/ijsra.2024.12.1.0923.
Full textGaur, Paavni. "AES Image Encryption (Advanced Encryption Standard)." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (2021): 1357–63. http://dx.doi.org/10.22214/ijraset.2021.39542.
Full textArek Satria, Bagas Piwari, and Tata Sutarbi. "Implementasi Algoritma Kriptografi AES untuk Keamanan Data pada Aplikasi Pesan Instan Berbasis Android." Jurnal Ilmiah Teknik Informatika dan Komunikasi 5, no. 2 (2025): 541–47. https://doi.org/10.55606/juitik.v5i2.1167.
Full textRavikiran, Dr P., M. Gnaneshwar, Enje Hepsibha, and Sudhesh Srivastav. "FPGA Implementation of 256-Bit Key AES Algorithm." International Journal for Research in Applied Science and Engineering Technology, no. 6 (June 30, 2024): 282–91. http://dx.doi.org/10.22214/ijraset.2024.63028.
Full textMonica, Taris, Asep Id Hadiana, and Melina Melina. "QUESTION BANK SECURITY USING RIVEST SHAMIR ADLEMAN ALGORITHM AND ADVANCED ENCRYPTION STANDARD." JIKO (Jurnal Informatika dan Komputer) 7, no. 3 (2024): 175–81. https://doi.org/10.33387/jiko.v7i3.8654.
Full textShivangi, Wadehra, Goel Shivam, and Sengar Nidhi. "AES Algorithm Encryption and Decryption." International Journal of Trend in Scientific Research and Development 2, no. 3 (2019): 1075–77. https://doi.org/10.31142/ijtsrd11221.
Full textPatil, Paritosh S. "New Encryption Technique for Secure SMS Transmission." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 11 (2014): 1265–69. https://doi.org/10.5281/zenodo.14759441.
Full textPutra, Jessa Syah, Rian Ardianto, and Purwono Purwono. "Tinjauan Terhadap Implementasi Advanced Encryption Standard 256 Dalam Keamanan Data." DEVICE : JOURNAL OF INFORMATION SYSTEM, COMPUTER SCIENCE AND INFORMATION TECHNOLOGY 5, no. 2 (2024): 335–55. https://doi.org/10.46576/device.v5i2.4621.
Full textSetiani, Rina, Eldiva Tegar Imananda, Wahyu Enggar Wicaksono, Muhammad Aziz Baihaqi, and Jeki Kuswanto. "Perbandingan Algoritma AES128 dengan SHA256 dalam Kecepatan Enkripsi Pengiriman Data." JOINS (Journal of Information System) 9, no. 1 (2024): 13–22. http://dx.doi.org/10.33633/joins.v9i1.8800.
Full textShiral, J. V., R. C. Deshmukh, J. S. Zade, and A. Potnurwar. "An Approach to Rijndael Algorithm." Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 2, no. 1 (2015): 01–05. http://dx.doi.org/10.53555/nncse.v2i1.508.
Full textZehui, Zhang, Yao Fu, and Tiegang Gao. "A Hybrid Image Encryption Algorithm Based on Chaos System and Simplified Advanced Encryption System." International Journal of Multimedia Data Engineering and Management 11, no. 4 (2020): 1–24. http://dx.doi.org/10.4018/ijmdem.2020100101.
Full textRidho, Akbar, and Moh Ali Romli. "SISTEM PENGAMANAN DOKUMEN MENGGUNAKAN ALGORITMA KRIPTOGRAFI ADVANCED ENCRYPTION STANDARD (AES-256)." Jurnal Informatika Teknologi dan Sains (Jinteks) 6, no. 4 (2024): 1044–52. http://dx.doi.org/10.51401/jinteks.v6i4.4887.
Full textUtami, Hamdan Dian Jaya Rozi Hyang, Riza Arifudin, and Alamsyah Alamsyah. "Security Login System on Mobile Application with Implementation of Advanced Encryption Standard (AES) using 3 Keys Variation 128-bit, 192-bit, and 256-bit." Scientific Journal of Informatics 6, no. 1 (2019): 34–44. http://dx.doi.org/10.15294/sji.v6i1.17589.
Full textEl Adib, Samir, and Naoufal Raissouni. "AES Encryption Algorithm Hardware Implementation: Throughput and Area Comparison of 128, 192 and 256-bits Key." International Journal of Reconfigurable and Embedded Systems (IJRES) 1, no. 2 (2012): 67. http://dx.doi.org/10.11591/ijres.v1.i2.pp67-74.
Full textManazipet, Pranitha, Sai Nukesh Matta, Vivek Kumar Ananthula, and Vive Harini. "DATA SECURITY ENHANCEMENT IN CLOUD COMPUTING USING AES ENCRYPTION." International Journal of Advanced Logistics, Transport and Engineering 8, no. 4 (2023): 34–51. http://dx.doi.org/10.52167/2790-5829-2023-8-4-34-51.
Full textFitriani, Intan, and Aryo Baskoro Utomo. "Implementasi Algoritma Advanced Encryption Standard (AES) pada Layanan SMS Desa." JISKA (Jurnal Informatika Sunan Kalijaga) 5, no. 3 (2020): 153. http://dx.doi.org/10.14421/jiska.2020.53-03.
Full textRohman, Ali, and Ahmad Munawir. "IMPLEMENTASI ENKRIPSI FILE BERBASIS CRYPTOGRAPHY UNTUK KEAMANAN DATA DI WINDOWS 10 MENGGUNAKAN ALGORITMA (AES)." Jurnal Ilmiah Sistem Informasi 3, no. 1 (2023): 149–59. http://dx.doi.org/10.46306/sm.v3i1.90.
Full textAV, Shruthi, Electa Alice, and Mohammed Bilal. "Low Power VLSI Design and Implementation of Area-Optimized 256-bit AEStandard for Real Time Images on Vertex 5." International Journal of Reconfigurable and Embedded Systems (IJRES) 2, no. 2 (2013): 83. http://dx.doi.org/10.11591/ijres.v2.i2.pp83-88.
Full textFahlevvi, Mohammad Rezza, Dhita Satria Aprilliana Putra, and Wahyu Ariandi. "ALGORITMA AES128-CBC (ADVANCED ENCRYPTION STANDARD) UNTUK ENKRIPSI DAN DEKRIPSI BERKAS DOKUMEN PT. ADIARTA MUZIZAT." Journal of Innovation And Future Technology (IFTECH) 7, no. 1 (2025): 166–76. https://doi.org/10.47080/iftech.v7i1.3929.
Full textThaenkaew, Phithak, Bruno Quoitin, and Ahmed Meddahi. "Leveraging Larger AES Keys in LoRaWAN: A Practical Evaluation of Energy and Time Costs." Sensors 23, no. 22 (2023): 9172. http://dx.doi.org/10.3390/s23229172.
Full textM. Shafiq Surameery, Nigar. "Modified Advanced Encryption Standard for Boost Image Encryption." UHD Journal of Science and Technology 6, no. 1 (2022): 52–59. http://dx.doi.org/10.21928/uhdjst.v6n1y2022.pp52-59.
Full textRais Rabtsani, Muhamad, Agung Triayudi, and Gatot Soepriyono. "Combination of AES (Advanced Encryption Standard) and SHA256 Algorithms for Data Security in Bill Payment Applications." SAGA: Journal of Technology and Information System 2, no. 1 (2024): 175–89. http://dx.doi.org/10.58905/saga.v2i1.250.
Full textParthasarathy, Rajamohan, Seow Soon Loong, and Preethy Ayyappan. "An Efficient Encryption Implementation Using AES Algorithm Techniques." Journal of Engineering & Technological Advances 3, no. 1 (2018): 61–70. http://dx.doi.org/10.35934/segi.v3i1.61.
Full textSaidi, Riad, Nada Cherrid, Tarek Bentahar, Hicham Mayache, and Atef Bentahar. "Number of Pixel Change Rate and Unified Average Changing Intensity for Sensitivity Analysis of Encrypted inSAR Interferogram." Ingénierie des systèmes d information 25, no. 5 (2020): 601–7. http://dx.doi.org/10.18280/isi.250507.
Full textIndrayani, Lilik Asih, and I. Made Suartana. "Implementasi Kriptografi dengan Modifikasi Algoritma Advanced Encryption Standard (AES) untuk Pengamanan File Document." Journal of Informatics and Computer Science (JINACS) 1, no. 01 (2019): 42–47. http://dx.doi.org/10.26740/jinacs.v1n01.p42-47.
Full textSeo, Hwajeong, Hyeokdong Kwon, Yongbeen Kwon, et al. "Fast Number Theoretic Transform for Ring-LWE on 8-bit AVR Embedded Processor." Sensors 20, no. 7 (2020): 2039. http://dx.doi.org/10.3390/s20072039.
Full textFarah Tawfiq Abdul Hussien and Teaba Wala Aldeen Khairi. "Performance Evaluation of AES, ECC and Logistic Chaotic Map Algorithms in Image Encryption." International Journal of Interactive Mobile Technologies (iJIM) 17, no. 10 (2023): 193–211. http://dx.doi.org/10.3991/ijim.v17i10.38787.
Full textTabeidi, Rania A., and Samia M. Masaad. "Survey and Analysis of the Evolution of Wireless Security in IEEE 802.11 Standards using Advanced Encryption Standard (AES)." Circulation in Computer Science 2, no. 10 (2017): 1–7. http://dx.doi.org/10.22632/ccs-2017-252-01.
Full textUgwunna, Charles Okechukwu, P. E. Okimba, O. A. Alabi, E. E. Orji, E. O. Olowofeso, and S. O. Ayomide. "ADVANCED ENCRYPTION STANDARD (AES) IMPLEMENTATION EFFICIENCY USING JAVA AND NODE.JS PLATFORMS." FUDMA JOURNAL OF SCIENCES 8, no. 6 (2024): 42–49. https://doi.org/10.33003/fjs-2024-0806-2832.
Full textAdlani, M. Adharis, and Ricky Eka Putra. "Pengamanan Mnemonic Phrase Menggunakan Modified Advanced Encryption Standart." Journal of Informatics and Computer Science (JINACS) 3, no. 04 (2022): 425–34. http://dx.doi.org/10.26740/jinacs.v3n04.p425-434.
Full textNugrahantoro, Achmad, Abdul Fadlil, and Imam Riadi. "Optimasi Keamanan Informasi Menggunakan Algoritma Advanced Encryption Standard (AES) Mode Chiper Block Chaining (CBC)." Jurnal Ilmiah FIFO 12, no. 1 (2020): 12. http://dx.doi.org/10.22441/fifo.2020.v12i1.002.
Full textAhmad Halimi, Abu Tholib, and Moh. Ainol Yaqin. "OPTIMASI KEAMANAN DATA PENERIMAAN MAHASISWA MENGGUNAKAN AES-256, SHA-256, DAN BASE64." JUSTIFY : Jurnal Sistem Informasi Ibrahimy 3, no. 1 (2024): 38–45. http://dx.doi.org/10.35316/justify.v3i1.5107.
Full textHussien, Marwah K. "Encryption of Stereo Images after Compression by Advanced Encryption Standard (AES)." Al-Mustansiriyah Journal of Science 28, no. 2 (2018): 156. http://dx.doi.org/10.23851/mjs.v28i2.511.
Full textLe, Van-Hoan, Nhu-Quynh Luc, and Duc-Huy Quach. "Developing a secure voice recognition service on Raspberry Pi." Bulletin of Electrical Engineering and Informatics 13, no. 5 (2024): 3544–51. http://dx.doi.org/10.11591/eei.v13i5.7655.
Full textM, Santhanalakshmi, Ms Lakshana K, and Ms Shahitya G M. "Enhanced AES-256 cipher round algorithm for IoT applications." Scientific Temper 14, no. 01 (2023): 184–90. http://dx.doi.org/10.58414/scientifictemper.2023.14.1.22.
Full textSwati, Jadhav, and Pise Nitin. "Securing Decentralized Storage in Blockchain: A Hybrid Cryptographic Framework." Cybernetics and Information Technologies 24, no. 2 (2024): 16–31. http://dx.doi.org/10.2478/cait-2024-0013.
Full textYang, Huiwei. "Application of Hybrid Encryption Algorithm in Hardware Encryption Interface Card." Security and Communication Networks 2022 (May 30, 2022): 1–11. http://dx.doi.org/10.1155/2022/7794209.
Full textNirwan, Saepudin, Dini Hamidin, and Shifa Eldita Azzalea. "Implementation of AES-256 Algorithm for Encryption on Chatting Platforms." Internet of Things and Artificial Intelligence Journal 4, no. 4 (2024): 616–24. http://dx.doi.org/10.31763/iota.v4i4.804.
Full textVetrivel, K., and S. P. Shantharajah. "A Study of Distinguisher Attack on AES-128 and AES-256 Block Ciphers through Model Based Classification Using Neural Network." Applied Mechanics and Materials 710 (January 2015): 133–38. http://dx.doi.org/10.4028/www.scientific.net/amm.710.133.
Full textBaban, Alaa, and Safa Hameed. "Securing a Web-Based Hospital Management System Using a Combination of AES and HMAC." Iraqi Journal for Electrical and Electronic Engineering 19, no. 1 (2023): 93–99. http://dx.doi.org/10.37917/ijeee.19.1.12.
Full textPrajuhana Putra, Agung, Herfina Herfina, Sufiatul Maryana, and Andrian Setiawan. "IMPLEMENTASI ALGORITMA AES (ADVANCE ENCRYPTION STANDARD) RIJNDAEL PADA APLIKASI KEAMANAN DATA." JIPETIK:Jurnal Ilmiah Penelitian Teknologi Informasi & Komputer 1, no. 2 (2020): 46–51. http://dx.doi.org/10.26877/jipetik.v1i2.4599.
Full textSingh, Sukhwinderjit, Hadian Satria Utama, and Joni Fat. "CHAT SIMULATOR USING AES ENCRYPTION." International Journal of Application on Sciences, Technology and Engineering 1, no. 3 (2023): 931–40. http://dx.doi.org/10.24912/ijaste.v1.i3.931-940.
Full textHussain, Iqtadar, Amir Anees, Temadher Al-Maadeed, and Muhammad Mustafa. "Construction of S-Box Based on Chaotic Map and Algebraic Structures." Symmetry 11, no. 3 (2019): 351. http://dx.doi.org/10.3390/sym11030351.
Full textAyu, Tasya Diah, and Yuli Asriningtias. "Aplikasi Pengamanan Dokumen Digital Perusahaan Berbasis Android Menggunakan Algoritma AES-256." Jurnal Sistem dan Teknologi Informasi (JustIN) 12, no. 1 (2024): 143. http://dx.doi.org/10.26418/justin.v12i1.71449.
Full textV. Kinge, Pravin, S. J. Honale, and C. M. Bobade. "Design of AES Algorithm for 128/192/256 Key Length in FPGA." International Journal of Reconfigurable and Embedded Systems (IJRES) 3, no. 2 (2014): 49. http://dx.doi.org/10.11591/ijres.v3.i2.pp49-53.
Full textChothe, Rupaliben V., Sunita P. Ugale, Dinesh M. Chandwadkar, and Shraddha V. Shelke. "Authenticated image encryption using robust chaotic maps and enhanced advanced encryption standard." Indonesian Journal of Electrical Engineering and Computer Science 37, no. 3 (2025): 1543. https://doi.org/10.11591/ijeecs.v37.i3.pp1543-1554.
Full textRupaliben, V. Chothe Sunita P. Ugale Dinesh M. Chandwadkar Shraddha V. Shelke. "Authenticated image encryption using robust chaotic maps and enhanced advanced encryption standard." Indonesian Journal of Electrical Engineering and Computer Science 37, no. 3 (2025): 1543–54. https://doi.org/10.11591/ijeecs.v37.i3.pp1543-1554.
Full textBaydaa Jaffer Al-Khafaji and Abdul Monem S Rahma. "Proposed new modification of AES algorithm for data security." Global Journal of Engineering and Technology Advances 12, no. 3 (2022): 117–22. http://dx.doi.org/10.30574/gjeta.2022.12.3.0165.
Full text