Journal articles on the topic 'CBC mode'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'CBC mode.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Chang, Kai-Chun, You-Tun Teng, and Wen-Long Chin. "High-Throughput CBC Mode Crypto Circuit." Electrical Science & Engineering 5, no. 1 (2023): 20–30. http://dx.doi.org/10.30564/ese.v5i1.5636.
Full textTan, Cheng, Xiaoyan Deng, and Lijun Zhang. "Identification of Block Ciphers under CBC Mode." Procedia Computer Science 131 (2018): 65–71. http://dx.doi.org/10.1016/j.procs.2018.04.186.
Full textAlslman, Yasmeen Shaher, Ashraf Ahmad, and Yousef AbuHour. "Enhanced and authenticated cipher block chaining mode." Bulletin of Electrical Engineering and Informatics 12, no. 4 (2023): 2357–62. http://dx.doi.org/10.11591/beei.v12i4.5113.
Full textAlslman, Yasmeen Shaher, Ashraf Ahmad, and Yousef AbuHour. "Enhanced and authenticated cipher block chaining mode." Bulletin of Electrical Engineering and Informatics 12, no. 4 (2023): 2357–62. http://dx.doi.org/10.11591/eei.v12i4.5113.
Full textAbidi, Abdessalem, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, and Christophe Guyeux. "Proving Chaotic Behavior of CBC Mode of Operation." International Journal of Bifurcation and Chaos 26, no. 07 (2016): 1650113. http://dx.doi.org/10.1142/s0218127416501133.
Full textRizky, Putri Alifia, Sopian Soim, and Sholihin Sholihin. "Implementasi Algoritma Kriptografi AES CBC Untuk Keamanan Komunikasi Data Pada Hardware." Jurnal RESISTOR (Rekayasa Sistem Komputer) 7, no. 2 (2024): 71–78. https://doi.org/10.31598/jurnalresistor.v7i2.1650.
Full textAntariksa, Feillyan Alfreda. "Ransomware Attack using AES Encryption on ECB, CBC and CFB Mode." Jurnal Ilmu Komputer 12, no. 1 (2019): 8. http://dx.doi.org/10.24843/jik.2019.v12.i01.p06.
Full textHwang, Seongjin, and Changhoon Lee. "Padding Oracle Attack on Block Cipher with CBC|CBC-Double Mode of Operation using the BOZ-PAD." Journal of Society for e-Business Studies 20, no. 1 (2015): 89–97. http://dx.doi.org/10.7838/jsebs.2015.20.1.089.
Full textAliyah, Jannatun. "APLIKASI MOBILE UNTUK ENKRIPSI DATA GAMBAR MENGGUNAKAN KOMBINASI FUNGSI XOR DAN MODE OPERASI CBC." Jurnal Informatika, Teknologi dan Sains 2, no. 4 (2020): 214–22. http://dx.doi.org/10.51401/jinteks.v2i4.824.
Full textLi, Jiajian, Shuai Cao, and Erol Yilmaz. "Characterization of Macro Mechanical Properties and Microstructures of Cement-Based Composites Prepared from Fly Ash, Gypsum and Steel Slag." Minerals 12, no. 1 (2021): 6. http://dx.doi.org/10.3390/min12010006.
Full textKuo-Tsang, Huang, Chiu Jung-Hui, and Shen Sung-Shiou. "A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS." International Journal of Network Security & Its Applications (IJNSA) 5, no. 1 (2013): 17–36. https://doi.org/10.5281/zenodo.3786423.
Full textNajah, Maulidyah Lailatun, and Kiswara Agung Santoso. "KOMBINASI CAESAR CIPHER DAN REVERSE CIPHER BERDASARKAN CIPHER BLOCK CHAINING." Majalah Ilmiah Matematika dan Statistika 21, no. 2 (2021): 101. http://dx.doi.org/10.19184/mims.v21i2.26978.
Full textR. K, Meenakshi, and A. Arivazhagan. "RTL Modelling for the Cipher Blcok Chaining Mode (Cbc) for Data Security." Indonesian Journal of Electrical Engineering and Computer Science 8, no. 3 (2017): 709. http://dx.doi.org/10.11591/ijeecs.v8.i3.pp709-711.
Full textBron, P., K. Martin, S. Sloan, D. Scherrer, and J. Tazi. "P025 Obefazimod and its active metabolites ABX-464-N-Glu act by stabilizing protein-protein interaction among key RNA biogenesis partners, CBC and ARS2." Journal of Crohn's and Colitis 18, Supplement_1 (2024): i279. http://dx.doi.org/10.1093/ecco-jcc/jjad212.0155.
Full textAlzain, Mohammed. "Chaos Baker-based Image Encryption in Operation Modes." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 17, no. 1 (2018): 7153–63. http://dx.doi.org/10.24297/ijct.v17i1.7328.
Full textNugrahantoro, Achmad, Abdul Fadlil, and Imam Riadi. "Optimasi Keamanan Informasi Menggunakan Algoritma Advanced Encryption Standard (AES) Mode Chiper Block Chaining (CBC)." Jurnal Ilmiah FIFO 12, no. 1 (2020): 12. http://dx.doi.org/10.22441/fifo.2020.v12i1.002.
Full textManullang, Sahat, Allwine, and Jakaria Sembiring. "Pengamanan Data File Dokumen Menggunakan Algoritma Advanced Encryption Standard Mode Chiper Block Chaining." Antivirus : Jurnal Ilmiah Teknik Informatika 17, no. 1 (2023): 52–65. http://dx.doi.org/10.35457/antivirus.v17i1.2811.
Full textShams, Rifat Ara. "Effect of Different Block Cipher Modes of Operation for Secured Data Transmission in Convolutional Encoded Dwt Based Mimo Mc-Cdma System." DIU Journal of Science & Technology 12, no. 1 (2024): 61–69. https://doi.org/10.5281/zenodo.13770817.
Full textManullang, Sahat. "Implementasi Kriptografi Pengamanan Data File Dokumen Menggunakan Algoritma Advanced Encryption Standard Mode Chiper Block Chaining." Jurnal Nasional Teknologi Komputer 3, no. 2 (2023): 87–95. http://dx.doi.org/10.61306/jnastek.v3i2.69.
Full textDindiene, Lina, Aleksejus Mihalkovich, Kestutis Luksys, and Eligijus Sakalauskas. "Matrix Power Function Based Block Cipher Operating in CBC Mode." Mathematics 10, no. 12 (2022): 2123. http://dx.doi.org/10.3390/math10122123.
Full textWahab, Adnan, and Rasiban. "Implementasi Keamanan Absensi Digital Menggunakan Algoritma Kriptografi AES Mode CBC." Jurnal Indonesia : Manajemen Informatika dan Komunikasi 6, no. 2 (2025): 941–51. https://doi.org/10.63447/jimik.v6i2.1347.
Full textHidayati, Layli Nur, Gita Fadila Fitriana, and Ipam Fuadina Adam. "Perbandingan Keacakan Citra Enkripsi Algoritma AES dan Camelia Uji NPCR dan UACI." JURIKOM (Jurnal Riset Komputer) 8, no. 6 (2021): 274. http://dx.doi.org/10.30865/jurikom.v8i6.3624.
Full textRiatma, Galih Putra, Bagas Satya Dian Nugraha, Anugrah Nur Rahmanto, and Fitri Fitri. "Performance Evaluation and the Impact of File Size on Various AES Encryption Modes." JURNAL JARTEL: Jurnal Jaringan Telekomunikasi 15, no. 2 (2025): 121–28. https://doi.org/10.33795/jartel.v15i2.7323.
Full textMohammed Jawad, Bushra, and Saif Al-alak. "Design and Implementation of Multi-key Blowfish and CAST Algorithm: Comparative Study with CBC, CFB and CTR Modes." Wasit Journal of Computer and Mathematics Science 2, no. 4 (2023): 87–98. http://dx.doi.org/10.31185/wjcms.203.
Full textSinurat, Santana, and Maranatha Pasaribu. "Text Encoding Using Cipher Block Chaining Algorithm." Jurnal Info Sains : Informatika dan Sains 11, no. 2 (2021): 13–17. http://dx.doi.org/10.54209/infosains.v11i2.42.
Full textSiregar, Salman. "Implementasi Mode Operasi Cipher Block Chaining (CBC) Untuk Mengoptimalkan Algoritma Affine Cipher Dalam Pengamanan Data." Bulletin of Information System Research 1, no. 3 (2023): 99–109. https://doi.org/10.62866/bios.v1i3.28.
Full textMahmud, Wildan, and Ery Mintorini. "Pengamanan Data Kombinasi Metode Cipher Block Chaining dan Modifikasi LSB." Techno.Com 19, no. 1 (2020): 97–102. http://dx.doi.org/10.33633/tc.v19i1.3375.
Full textGunawan, Renki, and Elvi Rahmi. "Implementasi Algoritma Blowfish Untuk Pengamanan Data Transaksi Dalam Aplikasi Berbasis Website E-commerce." Techno.Com 24, no. 2 (2025): 427–38. https://doi.org/10.62411/tc.v24i2.12472.
Full textSasongko, Arif, I. M. Narendra Kumara, Arief Wicaksana, Frédéric Rousseau, and Olivier Muller. "Hardware Context Switch-based Cryptographic Accelerator for Handling Multiple Streams." ACM Transactions on Reconfigurable Technology and Systems 14, no. 3 (2021): 1–25. http://dx.doi.org/10.1145/3460941.
Full textFahlevvi, Mohammad Rezza, Dhita Satria Aprilliana Putra, and Wahyu Ariandi. "ALGORITMA AES128-CBC (ADVANCED ENCRYPTION STANDARD) UNTUK ENKRIPSI DAN DEKRIPSI BERKAS DOKUMEN PT. ADIARTA MUZIZAT." Journal of Innovation And Future Technology (IFTECH) 7, no. 1 (2025): 166–76. https://doi.org/10.47080/iftech.v7i1.3929.
Full textSengamalai, Usha, T. M. Thamizh Thentral, Palanisamy Ramasamy, et al. "Mitigation of Circulating Bearing Current in Induction Motor Drive Using Modified ANN Based MRAS for Traction Application." Mathematics 10, no. 8 (2022): 1220. http://dx.doi.org/10.3390/math10081220.
Full textYeni, Manovri, Rosyidah Siregar, and Tommy Tommy. "Analisis Pengaplikasian Linear Congruential Generator (LCG) pada mode Cipher Block Chaining (CBC) Advanced Encryption Standard (AES)." JiTEKH 11, no. 2 (2023): 105–13. http://dx.doi.org/10.35447/jitekh.v11i2.795.
Full textNgo, Chi Trung, Jason K. Eshraghian, and Jong-Phil Hong. "An Area-Optimized and Power-Efficient CBC-PRESENT and HMAC-PHOTON." Electronics 11, no. 15 (2022): 2380. http://dx.doi.org/10.3390/electronics11152380.
Full textKim, Chan-Jung. "Prediction of System Parameters of Carbon-Based Composite Structure for Different Carbon Fiber Orientations with Mode Information at Reference Angle Only." Materials 14, no. 24 (2021): 7626. http://dx.doi.org/10.3390/ma14247626.
Full textROTH, YUVAL, and RAMESH JAIN. "SIMULATION AND EXPECTATION IN SENSOR-BASED SYSTEMS." International Journal of Pattern Recognition and Artificial Intelligence 07, no. 01 (1993): 145–73. http://dx.doi.org/10.1142/s0218001493000091.
Full textPenchalaiah, P., and K. Ramesh Reddy. "Random multiple key streams for encryption with added CBC mode of operation." Perspectives in Science 8 (September 2016): 57–60. http://dx.doi.org/10.1016/j.pisc.2016.03.007.
Full textRocha, Bruno dos S., Jose´ A. M. Xexe´o, and Renato H. Torres. "Artificial Intelligence Applied to the Identification of Block Ciphers under CBC Mode." International Journal of Computer Applications 185, no. 34 (2023): 1–8. http://dx.doi.org/10.5120/ijca2023923114.
Full textDe, Mello Flavio, and José A. M. Xexéo. "Identifying Encryption Algorithms in ECB and CBC Modes Using Computational Intelligence." JUCS - Journal of Universal Computer Science 24, no. (1) (2018): 25–42. https://doi.org/10.3217/jucs-024-01-0025.
Full textLi, Yuanjian, Chunhe Song, Jingya Dong, and Hao Zheng. "An efficient encryption method for smart grid data based on improved CBC mode." Journal of King Saud University - Computer and Information Sciences 35, no. 9 (2023): 101744. http://dx.doi.org/10.1016/j.jksuci.2023.101744.
Full textWati, Vera, Hanifatus Sa’diyah, and Dony Ariyus. "PENDEKATAN STEGO-KRIPTO MODE CIPHER BLOCK CHAINING UNTUK PENGAMANAN INFORMASI PADA CITRA DIGITAL." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 5, no. 2 (2020): 197–204. http://dx.doi.org/10.33480/jitk.v5i2.1160.
Full textAfsari, Melani, Dadang Iskandar Mulyana, Alfiani Damaiyanti, and Naini Sa’adah. "Implementasi Mode Operasi Kombinasi Cipher Block Chaining dan Metode LSB-1 Pada Pengamanan Data text." Jurnal Pendidikan Sains dan Komputer 2, no. 01 (2022): 70–82. http://dx.doi.org/10.47709/jpsk.v2i01.1381.
Full textMustafa, Emad Hameed, Mat Ibrahim Masrullizam, and Abd Manap Nurulfajar. "Compression and encryption for ECG biomedical signal in healthcare system." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 6 (2019): 2826–33. https://doi.org/10.12928/TELKOMNIKA.v17i6.13240.
Full textChhetri, Chhetra Bahadur. "Performance Analysis of Block Chaining Message Authentication Code (CBC MAC) and its Variants." National College of Computer Studies Research Journal 1, no. 1 (2021): 27–41. http://dx.doi.org/10.3126/nccsrj.v1i1.59973.
Full textHamdy, Muhammad Ihsan, Yanti Sopianti, Ekie Gilang Permata, and Muhammad Nur. "Perencanaan Perawatan pada Mesin Cake Breaker Conveyor di Pabrik Kelapa Sawit." Jurnal Teknik Industri: Jurnal Hasil Penelitian dan Karya Ilmiah dalam Bidang Teknik Industri 6, no. 1 (2020): 60. http://dx.doi.org/10.24014/jti.v6i1.10081.
Full textKim, Chan-Jung. "Mode Tracking of Unidirectional Carbon-Based Composite Structures Using Modified Mode Shape Vectors." Crystals 12, no. 2 (2022): 236. http://dx.doi.org/10.3390/cryst12020236.
Full textGáll, József, Pinar Gürgez, and Géza Horváth. "Adding an Avalanche Effect to a Stream Cipher Suitable for IoT Devices." Electronics 14, no. 13 (2025): 2546. https://doi.org/10.3390/electronics14132546.
Full textJoshi, Jay M., Kiran R. Parmar, and Upena D. Dalal. "Design and Implementation of KASUMI Algorithm in ISMACryp Encryption for Video Content Protection in DVB-H Application." Advanced Materials Research 403-408 (November 2011): 3847–53. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.3847.
Full textAbidi, Abdessalem, Christophe Guyeux, and Mohsen Machhout. "Evaluation of Chaotic Properties Of CBC Mode of Encryption Embedded with RC5 Block Cipher Algorithm." Interdisciplinary journal of Discontinuity, Nonlinearity, and Complexity 9, no. 4 (2020): 607–18. http://dx.doi.org/10.5890/dnc.2020.12.013.
Full textSaidi, Riad, Tarek Bentahar, Nada Cherrid, Atef Bentahar, and Hichem Mayache. "Evaluation and Analysis of Interferograms from an InSAR Radar Encrypted by an AES-Based Cryptosystem with The Five Encryption Modes." International Journal on Electrical Engineering and Informatics 12, no. 4 (2020): 912–32. http://dx.doi.org/10.15676/ijeei.2020.12.4.13.
Full textKrishna, Prasad Nandeti, Anshuman Singh Dr., and Mahmoud Yousef Dr. "Randomization Based Block Cipher with Key Mapped S-Box SelectionFull Text." International Journal on Cryptography and Information Security (IJCIS) 7, no. 1 (2017): 1–8. https://doi.org/10.5281/zenodo.1172584.
Full text