Journal articles on the topic 'AES algorithm'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'AES algorithm.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wadehra, Shivangi, Shivam Goel, and Nidhi Sengar. "AES Algorithm: Encryption and Decryption." International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (2018): 1075–77. http://dx.doi.org/10.31142/ijtsrd11221.
Full textNampalliwar, Ankita S. "Implementation of AES Algorithm." IOSR Journal of Engineering 4, no. 6 (2014): 01–05. http://dx.doi.org/10.9790/3021-04660105.
Full textAnusha D, Anusha D., and Swathi G. Swathi G. "Fast pipelined AES algorithm implemented on Xilinx FPGAsFast pipelined AES algorithm implemented on Xilinx FPGAs." International Journal of Scientific Research 2, no. 7 (2012): 159–62. http://dx.doi.org/10.15373/22778179/july2013/54.
Full textJankowski, Krzysztof, and Pierre Laurent. "Packed AES-GCM Algorithm Suitable for AES/PCLMULQDQ Instructions." IEEE Transactions on Computers 60, no. 1 (2011): 135–38. http://dx.doi.org/10.1109/tc.2010.147.
Full textDr Asha Ambhaikar, Mr Abhishek Guru,. "AES AND RSA-BASED HYBRID ALGORITHMS FOR MESSAGE ENCRYPTION & DECRYPTION." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (2021): 273–79. http://dx.doi.org/10.17762/itii.v9i1.129.
Full textGamido, Heidilyn V., Ariel M. Sison, and Ruji P. Medina. "Modified AES for Text and Image Encryption." Indonesian Journal of Electrical Engineering and Computer Science 11, no. 3 (2018): 942. http://dx.doi.org/10.11591/ijeecs.v11.i3.pp942-948.
Full textPradhan, Chittaranjan, and Ajay Kumar Bisoi. "Chaotic Variations of AES Algorithm." International Journal of Chaos, Control, Modelling and Simulation 2, no. 2 (2013): 19–25. http://dx.doi.org/10.5121/ijccms.2013.2203.
Full textAmine, Filali Mohamed, and Gafour Abdelkader. "Hybrid Approach of Modified AES." International Journal of Organizational and Collective Intelligence 7, no. 4 (2017): 83–93. http://dx.doi.org/10.4018/ijoci.2017100105.
Full textRaj Koti D, Raj Koti D., and Manoj Varma P. Manoj Varma P. "Fast Pipelined Aes Algorithm Implemented on Xilinx Fpgas." International Journal of Scientific Research 2, no. 10 (2012): 1–4. http://dx.doi.org/10.15373/22778179/oct2013/40.
Full textAttar, Naser, Hossein Deldari, and Marzie Kalantari. "AES Encryption Algorithm Parallelization in Order to Use Big Data Cloud Naser Attar, Hossein Deldari, Marzie Kalantari." Computer and Information Science 10, no. 3 (2017): 23. http://dx.doi.org/10.5539/cis.v10n3p23.
Full textYang, Zi Heng, Na Li, Li Yuan Liu, Ren Ji Qi, and Ling Ling Yu. "Research on Improved AES Encryption Algorithm." Advanced Materials Research 989-994 (July 2014): 1861–64. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.1861.
Full textAbikoye, Oluwakemi Christiana, Ahmad Dokoro Haruna, Abdullahi Abubakar, Noah Oluwatobi Akande, and Emmanuel Oluwatobi Asani. "Modified Advanced Encryption Standard Algorithm for Information Security." Symmetry 11, no. 12 (2019): 1484. http://dx.doi.org/10.3390/sym11121484.
Full textTahir, Ari Shawkat. "A Modified Advanced Encryption Standard Algorithm for Image Encryption." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 11 (2015): 6258–67. http://dx.doi.org/10.24297/ijct.v14i11.1811.
Full textSharma, Jyoti Bhagatram, Manjunath Nookala Krishnamurthy, Ankita Awase, et al. "Validation of a novel causality assessment scale for adverse events in non-small cell lung carcinoma patients treated with platinum and pemetrexed doublet chemotherapy." Therapeutic Advances in Drug Safety 12 (January 2021): 204209862199128. http://dx.doi.org/10.1177/2042098621991280.
Full textSingh, Amandeep. "Comparative Analysis of Reduced Round Dynamic AES with Standard AES Algorithm." International Journal of Computer Applications 183, no. 10 (2021): 41–49. http://dx.doi.org/10.5120/ijca2021921407.
Full textArifianto, Sofyan, Shinta Permatasari, and Aminudin Aminudin. "Modifikasi enkripsi dan dekripsi AES menggunakan polybius chiper dalam pengamanan data." Jurnal Repositor 1, no. 2 (2019): 117. http://dx.doi.org/10.22219/repositor.v1i2.808.
Full textAgarwal, Aishwarya, Pratibha Raj, and Sandhya Katiyar. "Secured Audio Encryption using AES Algorithm." International Journal of Computer Applications 178, no. 22 (2019): 29–33. http://dx.doi.org/10.5120/ijca2019918972.
Full textNavalgund, S. S., Akshay Desai, Krishna Ankalgi, and Harish Yamanur. "Parallelization of AES Algorithm Using OpenMP." Lecture Notes on Information Theory 1, no. 4 (2013): 144–47. http://dx.doi.org/10.12720/lnit.1.4.144-147.
Full textLiu, Yufeng, Xiangyang Xu, and Hao Su. "AES Algorithm Optimization and FPGA Implementation." IOP Conference Series: Earth and Environmental Science 267 (June 8, 2019): 042070. http://dx.doi.org/10.1088/1755-1315/267/4/042070.
Full text., Chaitali Haldankar. "IMPLEMENTATION OF AES AND BLOWFISH ALGORITHM." International Journal of Research in Engineering and Technology 03, no. 15 (2014): 143–46. http://dx.doi.org/10.15623/ijret.2014.0315026.
Full textShet, Ganesh Gopal, Jamuna V, Shravani S, Nayana H G, and Pramod Kumar S. "Implementation of AES Algorithm using Verilog." JNNCE Journal of Engineering and Management 4, no. 1 (2020): 17. http://dx.doi.org/10.37314/jjem.2020.040103.
Full textZhang, Chao, Yiqi Zhuang, Zhenrong Li, Yufeng Niu, and Chao Yuan. "AES Algorithm of Improving WPAN Throughput." Wireless Personal Communications 56, no. 4 (2009): 745–59. http://dx.doi.org/10.1007/s11277-009-9844-7.
Full textArrag, Sliman, Abdellatif Hamdoun, Abderrahim Tragha, and Salah eddine Khamlich. "Replace AES key expansion algorithm by modified genetic algorithm." Applied Mathematical Sciences 7 (2013): 7161–71. http://dx.doi.org/10.12988/ams.2013.38482.
Full textV. Kinge, Pravin, S. J. Honale, and C. M. Bobade. "Design of AES Pipelined Architecture for Image Encryption/Decryption Module." International Journal of Reconfigurable and Embedded Systems (IJRES) 3, no. 3 (2014): 114. http://dx.doi.org/10.11591/ijres.v3.i3.pp114-118.
Full textTabeidi, Rania A., and Samia M. Masaad. "Survey and Analysis of the Evolution of Wireless Security in IEEE 802.11 Standards using Advanced Encryption Standard (AES)." Circulation in Computer Science 2, no. 10 (2017): 1–7. http://dx.doi.org/10.22632/ccs-2017-252-01.
Full textJin, Jungha, Yewon Oh, and Keecheon Kim. "A Lightweight Block Cipher Algorithm for Secure SDN Environment." International Journal of Advanced Research in Engineering 4, no. 4 (2018): 1. http://dx.doi.org/10.24178/ijare.2018.4.4.01.
Full textThomas, Ambili, and V. Lakshmi Narasimhan. "Symmetric and Asymmetric Encryption Algorithm Modeling on CPU Execution Time as Employed Over a Mobile Environment." International Journal of Natural Computing Research 10, no. 2 (2021): 21–41. http://dx.doi.org/10.4018/ijncr.2021040102.
Full textV. Kinge, Pravin, S. J. Honale, and C. M. Bobade. "Design of AES Algorithm for 128/192/256 Key Length in FPGA." International Journal of Reconfigurable and Embedded Systems (IJRES) 3, no. 2 (2014): 49. http://dx.doi.org/10.11591/ijres.v3.i2.pp49-53.
Full textArboleda, Edwin Romeroso, Carla Eunice R. Fenomeno, and Joshua Z. Jimenez. "KED-AES algorithm: combined key encryption decryption and advance encryption standard algorithm." International Journal of Advances in Applied Sciences 8, no. 1 (2019): 44. http://dx.doi.org/10.11591/ijaas.v8.i1.pp44-53.
Full textMardianto, Is, and Kuswandi Kuswandi. "Implementasi Keamanan pada Transaksi Data Menggunakan Sertifikat Digital X.509." Jurnal ULTIMATICS 8, no. 1 (2017): 1–10. http://dx.doi.org/10.31937/ti.v8i1.496.
Full textSukiatmodjo, Arcelina, and YB Dwi Setianto. "Speed and Power Consumption Comparison between DES and AES Algorithm in Arduino." Scientific Journal of Informatics 6, no. 1 (2019): 45–53. http://dx.doi.org/10.15294/sji.v6i1.17838.
Full textM. Hassan, Sara, and Gihan G. Hamza. "Real-time FPGA implementation of concatenated AES and IDEA cryptography system." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (2021): 71. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp71-82.
Full textLaurentinus, Laurentinus, Harrizki Arie Pradana, Dwi Yuny Sylfania, and Fransiskus Panca Juniawan. "Performance comparison of RSA and AES to SMS messages compression using Huffman algorithm." Jurnal Teknologi dan Sistem Komputer 8, no. 3 (2020): 171–77. http://dx.doi.org/10.14710/jtsiskom.2020.13468.
Full textTRAN, Nhat-Phuong, Myungho LEE, Sugwon HONG, and Seung-Jae LEE. "High Throughput Parallelization of AES-CTR Algorithm." IEICE Transactions on Information and Systems E96.D, no. 8 (2013): 1685–95. http://dx.doi.org/10.1587/transinf.e96.d.1685.
Full textWankhade, Snehal, and Rashmi Mahajan. "Dynamic Partial Reconfiguration Implementation of AES Algorithm." International Journal of Computer Applications 97, no. 3 (2014): 15–18. http://dx.doi.org/10.5120/16986-7084.
Full text., Shraddha Satish Kashid. "ARM RECOGNITION: ENCRYPTION BY USING AES ALGORITHM." International Journal of Research in Engineering and Technology 03, no. 03 (2014): 65–69. http://dx.doi.org/10.15623/ijret.2014.0303012.
Full textSivaprakasam, T. "Implementation of AES Algorithm and Improve Throughput." International Journal for Research in Applied Science and Engineering Technology V, no. II (2017): 287–91. http://dx.doi.org/10.22214/ijraset.2017.2044.
Full textFahmy, Alaa El Din, and Ahmed Sobhy. "Improving the Performance of AES Encryption Algorithm." International Conference on Electrical Engineering 5, no. 5 (2006): 1–10. http://dx.doi.org/10.21608/iceeng.2006.33686.
Full textSachdev, Abha, and Mohit Bhansali. "Enhancing Cloud Computing Security using AES Algorithm." International Journal of Computer Applications 67, no. 9 (2013): 19–23. http://dx.doi.org/10.5120/11422-6766.
Full textRayarikar, Rohan, Sanket Upadhyay, and Priyanka Pimpale. "SMS Encryption using AES Algorithm on Android." International Journal of Computer Applications 50, no. 19 (2012): 12–17. http://dx.doi.org/10.5120/7909-1038.
Full textRohiem, A., F. Ahmed, and A. Mustafa. "FPGA Implementation of Reconfigurable Parameters AES Algorithm." International Conference on Aerospace Sciences and Aviation Technology 13, AEROSPACE SCIENCES (2009): 1–9. http://dx.doi.org/10.21608/asat.2009.23495.
Full textVetrivel, K., and S. P. Shantharajah. "A Study of Distinguisher Attack on AES-128 and AES-256 Block Ciphers through Model Based Classification Using Neural Network." Applied Mechanics and Materials 710 (January 2015): 133–38. http://dx.doi.org/10.4028/www.scientific.net/amm.710.133.
Full textShi, Hui, Xu Dong Qian, Jian Wei Lu, Jing Gong, and Yuan Qing Deng. "The Design and Analysis of the Key-Stream Generator Based on the AES." Applied Mechanics and Materials 529 (June 2014): 430–33. http://dx.doi.org/10.4028/www.scientific.net/amm.529.430.
Full textLee, Sung-Won, and Kwee-Bo Sim. "Design and Hardware Implementation of a Simplified DAG-Based Blockchain and New AES-CBC Algorithm for IoT Security." Electronics 10, no. 9 (2021): 1127. http://dx.doi.org/10.3390/electronics10091127.
Full textGamido, Heidilyn V. "Implementation of a bit permutation-based advanced encryption standard for securing text and image files." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (2020): 1596. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1596-1601.
Full textMustika, Laila. "Implementasi Algoritma AES Untuk Pengamanan Login Dan Data Customer Pada E-Commerce Berbasis Web." JURIKOM (Jurnal Riset Komputer) 7, no. 1 (2020): 148. http://dx.doi.org/10.30865/jurikom.v7i1.1943.
Full textFernando, Erick, Surjandy Surjandy, Muhamad Irsan, Hetty Rohayani A. H, and Fachruddin Fachruddin. "Review on Realization of AES 256bit Encryption with Raspberry Pi." IJNMT (International Journal of New Media Technology) 6, no. 1 (2019): 38–42. http://dx.doi.org/10.31937/ijnmt.v6i1.1070.
Full textSrinivaas, Charrith. "A Design Implementation and Comparative Analysis of Advanced Encryption Standard (AES) Algorithm Using Verilog HDL." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 1876–79. http://dx.doi.org/10.22214/ijraset.2021.36731.
Full textSaha, Rahul, G. Geetha, Gulshan Kumar, and Tai-hoon Kim. "RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys." Security and Communication Networks 2018 (November 6, 2018): 1–11. http://dx.doi.org/10.1155/2018/9802475.
Full textG. Chaloop, Samir, and Mahmood Z. Abdullah. "ENHANCING HYBRID SECURITY APPROACH USING AES AND RSA ALGORITHMS." Journal of Engineering and Sustainable Development 25, no. 4 (2021): 58–66. http://dx.doi.org/10.31272/jeasd.25.4.6.
Full text