Journal articles on the topic 'AES CRYPTOGRAPHY'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'AES CRYPTOGRAPHY.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yang, Huiwei. "Application of Hybrid Encryption Algorithm in Hardware Encryption Interface Card." Security and Communication Networks 2022 (May 30, 2022): 1–11. http://dx.doi.org/10.1155/2022/7794209.
Full textRaut, Kinjal. "A Comprehensive Review of Cryptographic Algorithms." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (2021): 1750–56. http://dx.doi.org/10.22214/ijraset.2021.39581.
Full textWang, Xing, Qiang Zhang, and Xiao Peng Wei. "A New Encryption Method Based on Rijndael Algorithm and DNA Computing." Applied Mechanics and Materials 20-23 (January 2010): 1241–46. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1241.
Full textDhansukhbhai Patel, Dr Dipakkumar, and Dr Subhashchandra Desai. "Securing textual information with an image in the image using a visual cryptography AES algorithm." International Journal of Enhanced Research in Management & Computer Applications 12, no. 06 (2023): 75–90. http://dx.doi.org/10.55948/ijermca.2023.0611.
Full textAhamad, Md Martuza, and Md Ibrahim Abdullah. "Comparison of Encryption Algorithms for Multimedia." Rajshahi University Journal of Science and Engineering 44 (November 19, 2016): 131–39. http://dx.doi.org/10.3329/rujse.v44i0.30398.
Full textSingh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications." Mathematical Statistician and Engineering Applications 70, no. 1 (2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.
Full textB S, Aditya, and Sharadadevi Kaganurmath. "Use of Cryptography and Signing for Network Security." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 4080–83. http://dx.doi.org/10.22214/ijraset.2022.45926.
Full textArifianto, Sofyan, Shinta Permatasari, and Aminudin Aminudin. "Modifikasi enkripsi dan dekripsi AES menggunakan polybius chiper dalam pengamanan data." Jurnal Repositor 1, no. 2 (2019): 117. http://dx.doi.org/10.22219/repositor.v1i2.808.
Full textKurbet, ejashwini C., and Jenitta J. "NANO-AES Security Algorithm for Image Cryptography." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (2023): 742–46. http://dx.doi.org/10.22214/ijraset.2023.55238.
Full textTahir, Ari Shawkat. "A Modified Advanced Encryption Standard Algorithm for Image Encryption." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 11 (2015): 6258–67. http://dx.doi.org/10.24297/ijct.v14i11.1811.
Full textShah, Aayush, Prabhat Mahato, and Aadarsh Bhagat. "Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (2023): 1626–42. http://dx.doi.org/10.22214/ijraset.2023.55341.
Full textSatapure, Pratiksha. "Different Methods of Encryption and Decryption." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (2021): 170–77. http://dx.doi.org/10.22214/ijraset.2021.38732.
Full textMustika, Laila. "Implementasi Algoritma AES Untuk Pengamanan Login Dan Data Customer Pada E-Commerce Berbasis Web." JURIKOM (Jurnal Riset Komputer) 7, no. 1 (2020): 148. http://dx.doi.org/10.30865/jurikom.v7i1.1943.
Full textVerma, Rohit, and Aman Kumar Sharma. "Cryptography: Avalanche effect of AES and RSA." International Journal of Scientific and Research Publications (IJSRP) 10, no. 4 (2020): p10013. http://dx.doi.org/10.29322/ijsrp.10.04.2020.p10013.
Full textAllakany, Alaa, Abeer Saber, Samih M. Mostafa, Maazen Alsabaan, Mohamed I. Ibrahem, and Haitham Elwahsh. "Enhancing Security in ZigBee Wireless Sensor Networks: A New Approach and Mutual Authentication Scheme for D2D Communication." Sensors 23, no. 12 (2023): 5703. http://dx.doi.org/10.3390/s23125703.
Full textSweatha, A. Anjalin, and K. Mohaideen Pitchai. "Construction of Cryptographically Secure AES S-Box using Second-order Reversible Cellular Automata." Journal of Intelligent & Fuzzy Systems 39, no. 3 (2020): 4313–18. http://dx.doi.org/10.3233/jifs-200326.
Full textO. O, Rejuaro, Adetunji A. B., Adedeji F., Falohun A. S., Iromini N. A., and Adebajo O. O. "Development of an Improved Access Control System using an Enhanced Bimodal Crypto-Biometric System." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 752–68. http://dx.doi.org/10.22214/ijraset.2023.49548.
Full textOlaniyan, Olatayo Moses, Ayobami Taiwo Olusesi, Bolaji Abigail Omodunbi, Wajeed Bolanle Wahab, Olusogo Julius Adetunji, and Bamidele Musiliu Olukoya. "A Data Security Model for Mobile Ad Hoc Network Using Linear Function Mayfly Advanced Encryption Standard." International Journal of Emerging Technology and Advanced Engineering 13, no. 3 (2023): 101–10. http://dx.doi.org/10.46338/ijetae0323_10.
Full textMohammad, Hussein M., and Alharith A. Abdullah. "Enhancement process of AES: a lightweight cryptography algorithm-AES for constrained devices." TELKOMNIKA (Telecommunication Computing Electronics and Control) 20, no. 3 (2022): 551. http://dx.doi.org/10.12928/telkomnika.v20i3.23297.
Full textEt. al., Arsha Kolate,. "An Information Security Using DNA Cryptography along with AES Algorithm." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 1S (2021): 183–92. http://dx.doi.org/10.17762/turcomat.v12i1s.1607.
Full textYan, Tian Yun, Kai Kuo Xu, Min Wei, and Jia He. "Studies on Security Communications of Embedded Devices." Advanced Materials Research 216 (March 2011): 609–12. http://dx.doi.org/10.4028/www.scientific.net/amr.216.609.
Full textT, Ramya, Ramya G, Karthik Raju, Ravi J, and Deepak Verma. "An Efficient AES Algorithm for Cryptography Using VLSI." ECS Transactions 107, no. 1 (2022): 5605–12. http://dx.doi.org/10.1149/10701.5605ecst.
Full textVijayarajan, R., P. Gnanasivam, and R. Avudaiammal. "Bio-Key Based AES for Personalized Image Cryptography." Computer Journal 62, no. 11 (2019): 1695–705. http://dx.doi.org/10.1093/comjnl/bxz030.
Full textSingh, Pankaj, and Sachin Kumar. "Study & analysis of cryptography algorithms : RSA, AES, DES, T-DES, blowfish." International Journal of Engineering & Technology 7, no. 1.5 (2017): 221. http://dx.doi.org/10.14419/ijet.v7i1.5.9150.
Full textSinghal, Yash, Adwit Agarwal, Shivank Mittal, Shristi Katyayani, and Amit Sharma. "Database Security using Cryptography." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 582–87. http://dx.doi.org/10.22214/ijraset.2022.43621.
Full textTabeidi, Rania A., and Samia M. Masaad. "Survey and Analysis of the Evolution of Wireless Security in IEEE 802.11 Standards using Advanced Encryption Standard (AES)." Circulation in Computer Science 2, no. 10 (2017): 1–7. http://dx.doi.org/10.22632/ccs-2017-252-01.
Full textChang, Lipeng, Yuechuan Wei, Xiangru Wang, and Xiaozhong Pan. "Collision Forgery Attack on the AES-OTR Algorithm under Quantum Computing." Symmetry 14, no. 7 (2022): 1434. http://dx.doi.org/10.3390/sym14071434.
Full textBagul, Riya, Atharva Karaguppi, Vishwas Karale, Mudit Singal, and Dr Vaishali Ingale. "A Dynamic and Highly Configurable Crypto-Processor for brief communication interval." Journal of University of Shanghai for Science and Technology 23, no. 05 (2021): 551–61. http://dx.doi.org/10.51201/jusst/21/05162.
Full textChowdhary, Chiranji Lal, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan Perumal, and Muhammad Fazal Ijaz. "Analytical Study of Hybrid Techniques for Image Encryption and Decryption." Sensors 20, no. 18 (2020): 5162. http://dx.doi.org/10.3390/s20185162.
Full textShukla, Piyush Kumar, Amer Aljaedi, Piyush Kumar Pareek, Adel R. Alharbi, and Sajjad Shaukat Jamal. "AES Based White Box Cryptography in Digital Signature Verification." Sensors 22, no. 23 (2022): 9444. http://dx.doi.org/10.3390/s22239444.
Full textLi, Juan. "A Symmetric Cryptography Algorithm in Wireless Sensor Network Security." International Journal of Online Engineering (iJOE) 13, no. 11 (2017): 102. http://dx.doi.org/10.3991/ijoe.v13i11.7752.
Full textOukili, Soufiane, and Seddik Bri. "Hardware Implementation of AES Algorithm with Logic S-box." Journal of Circuits, Systems and Computers 26, no. 09 (2017): 1750141. http://dx.doi.org/10.1142/s0218126617501419.
Full textEt. al., Pravin Soni,. "Performance Analysis of Cascaded Hybrid Symmetric Encryption Models." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 1699–708. http://dx.doi.org/10.17762/turcomat.v12i2.1506.
Full textAz, Maulyanda, Syafrial Fachri Pane, and Rolly Maulana Awangga. "Cryptography: Cryptography: Perancangan Middleware Web Service Encryptor menggunakan Triple Key MD5. Base64, dan AES." Jurnal Tekno Insentif 15, no. 2 (2021): 65–75. http://dx.doi.org/10.36787/jti.v15i1.497.
Full textGayathri, P., Syed Umar, G. Sridevi, N. Bashwanth, and Royyuru Srikanth. "Hybrid Cryptography for Random-key Generation based on ECC Algorithm." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 3 (2017): 1293. http://dx.doi.org/10.11591/ijece.v7i3.pp1293-1298.
Full textKumar, Thanikodi Manoj, Kasarla Satish Reddy, Stefano Rinaldi, Bidare Divakarachari Parameshachari, and Kavitha Arunachalam. "A Low Area High Speed FPGA Implementation of AES Architecture for Cryptography Application." Electronics 10, no. 16 (2021): 2023. http://dx.doi.org/10.3390/electronics10162023.
Full textM, Santhanalakshmi, Ms Lakshana K, and Ms Shahitya G M. "Enhanced AES-256 cipher round algorithm for IoT applications." Scientific Temper 14, no. 01 (2023): 184–90. http://dx.doi.org/10.58414/scientifictemper.2023.14.1.22.
Full textFazila, S., B. Reddaiah, S. Sai Ramya, B. J. Karuna Sagar, and C. Swetha. "Enhancing AES with Key Dependent S-Box and Transpose MDS Matrix." International Journal of Innovative Technology and Exploring Engineering 11, no. 9 (2022): 61–66. http://dx.doi.org/10.35940/ijitee.g9245.0811922.
Full textG. Chaloop, Samir, and Mahmood Z. Abdullah. "ENHANCING HYBRID SECURITY APPROACH USING AES AND RSA ALGORITHMS." Journal of Engineering and Sustainable Development 25, no. 4 (2021): 58–66. http://dx.doi.org/10.31272/jeasd.25.4.6.
Full textPyrkova, A. YU, and ZH E. Temirbekova. "Compare encryption performance across devices to ensure the security of the IOT." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 2 (2020): 894. http://dx.doi.org/10.11591/ijeecs.v20.i2.pp894-902.
Full textSingh, Amritpal, Mohit Marwaha, Baljinder Singh, and Sandeep Singh. "Comparative Study of DES, 3DES, AES and RSA." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 9, no. 3 (2013): 1162–70. http://dx.doi.org/10.24297/ijct.v9i3.3342.
Full textNurnaningsih, Desi, and Angga Aditya Permana. "RANCANGAN APLIKASI PENGAMANAN DATA DENGAN ALGORITMA ADVANCED ENCYPTION STANDARD (AES)." JURNAL TEKNIK INFORMATIKA 11, no. 2 (2018): 177–86. http://dx.doi.org/10.15408/jti.v11i2.7811.
Full textTaufiqqurrachman, Taufiqurrachman, and Dani Elsandi. "Security Analysis and Encryption Time Comparison Description on Cryptography Advanced Encryption Standard (AES)." Jurnal Inovatif : Inovasi Teknologi Informasi dan Informatika 5, no. 1 (2022): 60. http://dx.doi.org/10.32832/inova-tif.v5i1.8345.
Full textP, Varsha, and Dr V. Nanammal. "Image Cryptography Design Based on Nano AES Security Algorithm." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (2022): 590–93. http://dx.doi.org/10.22214/ijraset.2022.46613.
Full textFei, Xiongwei, Kenli Li, and Wangdong Yang. "A fast parallel cryptography algorithm based on AES-NI." Journal of Intelligent & Fuzzy Systems 31, no. 2 (2016): 1099–107. http://dx.doi.org/10.3233/jifs-169039.
Full textAdlani, M. Adharis, and Ricky Eka Putra. "Pengamanan Mnemonic Phrase Menggunakan Modified Advanced Encryption Standart." Journal of Informatics and Computer Science (JINACS) 3, no. 04 (2022): 425–34. http://dx.doi.org/10.26740/jinacs.v3n04.p425-434.
Full textMohamad, Rafidah. "Data hiding by using AES Algorithm." Wasit Journal of Computer and Mathematics Science 1, no. 4 (2022): 112–19. http://dx.doi.org/10.31185/wjcm.82.
Full textKulkarni, Utkarsha, Rosemeen Mansuri, and Riya Adikane. "File Storage on Cloud Using Cryptography." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (2022): 1950–53. http://dx.doi.org/10.22214/ijraset.2022.42652.
Full textSivamurugan, D., and L. Raja. "SECURE ROUTING IN MANET USING HYBRID CRYPTOGRAPHY." International Journal of Research -GRANTHAALAYAH 5, no. 4 (2017): 83–91. http://dx.doi.org/10.29121/granthaalayah.v5.i4.2017.1798.
Full textIftikhar, U., K. Asrar, M. Waqas, and S. A. Ali. "Evaluating the Performance Parameters of Cryptographic Algorithms for IOT-based Devices." Engineering, Technology & Applied Science Research 11, no. 6 (2021): 7867–74. http://dx.doi.org/10.48084/etasr.4263.
Full text