Academic literature on the topic 'Data Encryption Standard'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data Encryption Standard.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Data Encryption Standard"
Silva G., Víctor M., Eduardo Rodríguez Escobar, and Eduardo Vega Alvarado. "Criptografía: Data Encryption Standard." Polibits 30 (July 20, 2004): 3–5. http://dx.doi.org/10.17562/pb-30-1.
Full textCoppersmith, Don, Chris Holloway, Stephen M. Matyas, and Nev Zunic. "The data encryption standard." Information Security Technical Report 2, no. 2 (January 1997): 22–24. http://dx.doi.org/10.1016/s1363-4127(97)81325-8.
Full textHighland, HaroldJoseph. "Data encryption standard II?" Computers & Security 6, no. 3 (June 1987): 195–96. http://dx.doi.org/10.1016/0167-4048(87)90095-2.
Full textM, Jayasarathi, Rajeshwari S, Shiny Mercy I, and Rathika S.K.B. "Enhanced on Data Encryption Standard for Secured Cloud Storage." Bonfring International Journal of Software Engineering and Soft Computing 9, no. 1 (March 29, 2019): 07–10. http://dx.doi.org/10.9756/bijsesc.9004.
Full textChen, Meixi. "Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm." Complexity 2021 (June 4, 2021): 1–12. http://dx.doi.org/10.1155/2021/7212688.
Full textM. Shafiq Surameery, Nigar. "Modified Advanced Encryption Standard for Boost Image Encryption." UHD Journal of Science and Technology 6, no. 1 (April 27, 2022): 52–59. http://dx.doi.org/10.21928/uhdjst.v6n1y2022.pp52-59.
Full textKasiran, Zolidah, Hikma Farah Ali, and Noorhayati Mohamed Noor. "Time performance analysis of advanced encryption standard and data encryption standard in data security transaction." Indonesian Journal of Electrical Engineering and Computer Science 16, no. 2 (November 1, 2019): 988. http://dx.doi.org/10.11591/ijeecs.v16.i2.pp988-994.
Full textKumar, Sanjay, and Sandeep Srivastava. "Image Encryption using Simplified Data Encryption Standard (S-DES)." International Journal of Computer Applications 104, no. 2 (October 18, 2014): 38–42. http://dx.doi.org/10.5120/18178-9070.
Full textEt. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.
Full textOkazaki, Hiroyuki, and Yasunari Shidama. "Formalization of the Data Encryption Standard." Formalized Mathematics 20, no. 2 (December 1, 2012): 125–46. http://dx.doi.org/10.2478/v10037-012-0016-y.
Full textDissertations / Theses on the topic "Data Encryption Standard"
Meissner, Robert. "Data Encryption Standard." Universitätsbibliothek Chemnitz, 2002. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200200590.
Full textMeißner, Robert. "Data Encryption Standard (DES) [Einführung, Funktionsweise, Risiken, Alternativen] /." [S.l. : s.n.], 2002. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB10324753.
Full textJolfaei, Alireza. "Robust Encryption Schemes for 3D Content Protection." Thesis, Griffith University, 2016. http://hdl.handle.net/10072/367353.
Full textThesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Information and Communication Technology
Science, Environment, Engineering and Technology
Full Text
Mantzouris, Panteleimon. "Computational algebraic attacks on the Advanced Encryption Standard (AES)." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FMantzouris.pdf.
Full textThesis Advisor(s): Canright, David ; Butler, Jon. "September 2009." Description based on title screen as viewed on 5 November 2009. Author(s) subject terms: Advanced Encryption Standard (AES), Rijndael's algorithm, block cipher, decipher, round of the algorithm, sparse multivariate polynomial. Includes bibliographical references (p. 101). Also available in print.
Tandon, Prateek. "High-performance advanced encryption standard (AES) security co-processor design." Thesis, Available online, Georgia Institute of Technology, 2004:, 2003. http://etd.gatech.edu/theses/available/etd-04082004-180433/unrestricted/tandon%5fprateek%5f200312%5fms.pdf.
Full textUehara, Takeyuki. "Contributions to image encryption and authentication." Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20040920.124409/index.html.
Full textVan, Dyken Jason Daniel. "Schemes to reduce power in FPGA implementations of the advanced encryption standard." Online access for everyone, 2007. http://www.dissertations.wsu.edu/Thesis/Fall2007/J_Van_Dyken_111307.pdf.
Full textMcDaniel, Larry T. III. "An Investigation of Differential Power Analysis Attacks on FPGA-based Encryption Systems." Thesis, Virginia Tech, 2003. http://hdl.handle.net/10919/33451.
Full textMaster of Science
Lopez, Samuel. "MODERN CRYPTOGRAPHY." CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/729.
Full textShin, Dong Il. "Improving trust and securing data accessibility for e-health decision making by using data encryption techniques." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/50636/1/Dong_Il_Shin_Thesis.pdf.
Full textBooks on the topic "Data Encryption Standard"
National Bureau of Standards. Data encryption standard. Gaithersburg, MD: U.S. Dept. of Commerce, National Bureau of Standards, 1988.
Find full textComputer Systems Laboratory (U.S.), ed. Data Encryption Standard (DES). Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Find full textComputer Systems Laboratory (U.S.), ed. Escrowed Encryption Standard (EES). Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Find full textBiham, Eli. Differential cryptanalysis of the data encryption standard. New York: Springer-Verlag, 1993.
Find full textBiham, Eli, and Adi Shamir. Differential Cryptanalysis of the Data Encryption Standard. New York, NY: Springer New York, 1993. http://dx.doi.org/10.1007/978-1-4613-9314-6.
Full textBrute force: Cracking the data encryption standard. New York: Copernicus Books, 2005.
Find full textInformation Technology Laboratory (National Institute of Standards and Technology). Announcing the Advanced Encryption Standard (AES). Gaithersburg, MD: Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2001.
Find full textIntroduction to the analysis of the data encryption standard (DES). Laguna Hills, CA: Aegean Park Press, 1991.
Find full textSimovits, Mikael J. The DES, an extensive documentation and evaluation of the Data Encryption Standard. Laguna Hills, Calif: Aegean Park Press, 1995.
Find full textBook chapters on the topic "Data Encryption Standard"
Weik, Martin H. "data encryption standard." In Computer Science and Communications Dictionary, 347. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_4267.
Full textSchneier, Bruce. "Data Encryption Standard (DES)." In Applied Cryptography, Second Edition, 265–301. Indianapolis, Indiana: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119183471.ch12.
Full textBiryukov, Alex, and Christophe De Cannière. "Data Encryption Standard (DES)." In Encyclopedia of Cryptography and Security, 295–301. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_568.
Full textDaemen, Joan, and Vincent Rijmen. "The Data Encryption Standard." In Information Security and Cryptography, 81–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/978-3-662-04722-4_6.
Full textDaemen, Joan, and Vincent Rijmen. "The Data Encryption Standard." In Information Security and Cryptography, 83–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-60769-5_6.
Full textPelzl, Jan, and Christof Paar. "Der Data Encryption Standard und Alternativen." In Kryptografie verständlich, 63–101. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-49297-0_3.
Full textVerma, Jatin, and Sunita Prasad. "Security Enhancement in Data Encryption Standard." In Information Systems, Technology and Management, 325–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00405-6_34.
Full textAhlswede, Rudolf. "The Mathematical Background of the Advanced Encryption Standard." In Hiding Data - Selected Topics, 155–224. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31515-7_3.
Full textPaar, Christof, and Jan Pelzl. "The Data Encryption Standard (DES) and Alternatives." In Understanding Cryptography, 55–86. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-04101-3_3.
Full textMiller, Michael. "Lucifer-Chiffre und der Data Encryption Standard." In Symmetrische Verschlüsselungsverfahren, 115–48. Wiesbaden: Vieweg+Teubner Verlag, 2003. http://dx.doi.org/10.1007/978-3-322-80101-2_4.
Full textConference papers on the topic "Data Encryption Standard"
Stanisavljevic, Zarko S. "Data encryption standard visual representation." In 2015 23rd Telecommunications Forum Telfor (TELFOR). IEEE, 2015. http://dx.doi.org/10.1109/telfor.2015.7377622.
Full textHaitao, Sun, He Xunlai, Zhao Qiang, and Chu Jie. "Differential Power Analysis for Data Encryption Standard." In 2007 8th International Conference on Electronic Measurement and Instruments. IEEE, 2007. http://dx.doi.org/10.1109/icemi.2007.4350472.
Full textKaushik, Akhil, Anant Kumar, and Manoj Barnela. "Block Encryption Standard for Transfer of data." In 2010 International Conference on Networking and Information Technology (ICNIT 2010). IEEE, 2010. http://dx.doi.org/10.1109/icnit.2010.5508489.
Full textAbdelwahab, Murtada M. "High performance FPGA implementation of Data encryption standard." In 2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCNEEE). IEEE, 2015. http://dx.doi.org/10.1109/iccneee.2015.7381424.
Full textGOPE, PROSANTA, D. GHOSH, A. R. KRISHNA CHELLURI, and PINAKI CHATTOPADHYAY. "MULTI OPERATOR DELIMITER BASED DATA ENCRYPTION STANDARD (MODDES)." In Proceedings of the International Conference on ICCNT 2009. WORLD SCIENTIFIC, 2009. http://dx.doi.org/10.1142/9789814289771_0031.
Full textSilva G., Victor Manuel. "A cryptanalysis procedure of the data encryption standard." In Optics & Photonics 2005, edited by Mark S. Schmalz. SPIE, 2005. http://dx.doi.org/10.1117/12.620955.
Full textPathak, Sonam, Rachana kamble, and Deepa Chaursia. "An efficient data encryption standard image encryption technique with RGB random uncertainty." In 2014 International Conference on Optimization, Reliabilty, and Information Technology (ICROIT). IEEE, 2014. http://dx.doi.org/10.1109/icroit.2014.6798366.
Full textPuchala, Dariusz, Kamil Stokfiszewski, and Mykhaylo Yatsymirskyy. "Encryption Before Compression Coding Scheme for JPEG Image Compression Standard." In 2020 Data Compression Conference (DCC). IEEE, 2020. http://dx.doi.org/10.1109/dcc47342.2020.00039.
Full textPai, R. R., Seung J. Han Seung J. Han, and M. Lowy. "DESIGN AND IMPLEMENTATION OF THE EXTENDED DATA ENCRYPTION STANDARD." In 1996 International Conference on Consumer Electronics. IEEE, 1996. http://dx.doi.org/10.1109/icce.1996.517252.
Full textNalini, N., and G. Raghavendra Rao. "Cryptanalysis of Simplified Data Encryption Standard via Optimization Heuristics." In 2005 3rd International Conference on Intelligent Sensing and Information Processing. IEEE, 2005. http://dx.doi.org/10.1109/icisip.2005.1619415.
Full textReports on the topic "Data Encryption Standard"
Robertson, Perry J., Lyndon George Pierson, and Edward L. Witzke. Data encryption standard ASIC design and development report. Office of Scientific and Technical Information (OSTI), October 2003. http://dx.doi.org/10.2172/918309.
Full textKelly, S. Security Implications of Using the Data Encryption Standard (DES). RFC Editor, December 2006. http://dx.doi.org/10.17487/rfc4772.
Full textSchaad, J., and R. Housley. Wrapping a Hashed Message Authentication Code (HMAC) key with a Triple-Data Encryption Standard (DES) Key or an Advanced Encryption Standard (AES) Key. RFC Editor, May 2003. http://dx.doi.org/10.17487/rfc3537.
Full textData Encryption Standard. Gaithersburg, MD: National Institute of Standards and Technology, 1988. http://dx.doi.org/10.6028/nist.fips.46-1.
Full textFederal Information Processing Standards Publication: data encryption standard (DES). Gaithersburg, MD: National Institute of Standards and Technology, 1993. http://dx.doi.org/10.6028/nist.fips.46-2.
Full textFederal Information Processing Standards Publication: interoperability and security requirements for use of the data encryption standard with CCITT group 3 facsimile equipment. Gaithersburg, MD: National Bureau of Standards, 1985. http://dx.doi.org/10.6028/nbs.fips.141.
Full text