Academic literature on the topic 'Data Encryption Standard (DES)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data Encryption Standard (DES).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Data Encryption Standard (DES)"
Silva G., Víctor M., Eduardo Rodríguez Escobar, and Eduardo Vega Alvarado. "Criptografía: Data Encryption Standard." Polibits 30 (July 20, 2004): 3–5. http://dx.doi.org/10.17562/pb-30-1.
Full textCoppersmith, Don, Chris Holloway, Stephen M. Matyas, and Nev Zunic. "The data encryption standard." Information Security Technical Report 2, no. 2 (January 1997): 22–24. http://dx.doi.org/10.1016/s1363-4127(97)81325-8.
Full textHighland, HaroldJoseph. "Data encryption standard II?" Computers & Security 6, no. 3 (June 1987): 195–96. http://dx.doi.org/10.1016/0167-4048(87)90095-2.
Full textM, Jayasarathi, Rajeshwari S, Shiny Mercy I, and Rathika S.K.B. "Enhanced on Data Encryption Standard for Secured Cloud Storage." Bonfring International Journal of Software Engineering and Soft Computing 9, no. 1 (March 29, 2019): 07–10. http://dx.doi.org/10.9756/bijsesc.9004.
Full textChen, Meixi. "Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm." Complexity 2021 (June 4, 2021): 1–12. http://dx.doi.org/10.1155/2021/7212688.
Full textKasiran, Zolidah, Hikma Farah Ali, and Noorhayati Mohamed Noor. "Time performance analysis of advanced encryption standard and data encryption standard in data security transaction." Indonesian Journal of Electrical Engineering and Computer Science 16, no. 2 (November 1, 2019): 988. http://dx.doi.org/10.11591/ijeecs.v16.i2.pp988-994.
Full textKumar, Sanjay, and Sandeep Srivastava. "Image Encryption using Simplified Data Encryption Standard (S-DES)." International Journal of Computer Applications 104, no. 2 (October 18, 2014): 38–42. http://dx.doi.org/10.5120/18178-9070.
Full textOkazaki, Hiroyuki, and Yasunari Shidama. "Formalization of the Data Encryption Standard." Formalized Mathematics 20, no. 2 (December 1, 2012): 125–46. http://dx.doi.org/10.2478/v10037-012-0016-y.
Full textEt. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.
Full textSimran, Simran, and Parminder Singh Jassal. "Synthesis of 64-Bit Triple Data Encryption Standard Algorithm using VHDL." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (June 30, 2018): 775–78. http://dx.doi.org/10.31142/ijtsrd14159.
Full textDissertations / Theses on the topic "Data Encryption Standard (DES)"
Meissner, Robert. "Data Encryption Standard." Universitätsbibliothek Chemnitz, 2002. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200200590.
Full textMeißner, Robert. "Data Encryption Standard (DES) [Einführung, Funktionsweise, Risiken, Alternativen] /." [S.l. : s.n.], 2002. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB10324753.
Full textMantzouris, Panteleimon. "Computational algebraic attacks on the Advanced Encryption Standard (AES)." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FMantzouris.pdf.
Full textThesis Advisor(s): Canright, David ; Butler, Jon. "September 2009." Description based on title screen as viewed on 5 November 2009. Author(s) subject terms: Advanced Encryption Standard (AES), Rijndael's algorithm, block cipher, decipher, round of the algorithm, sparse multivariate polynomial. Includes bibliographical references (p. 101). Also available in print.
Tandon, Prateek. "High-performance advanced encryption standard (AES) security co-processor design." Thesis, Available online, Georgia Institute of Technology, 2004:, 2003. http://etd.gatech.edu/theses/available/etd-04082004-180433/unrestricted/tandon%5fprateek%5f200312%5fms.pdf.
Full textUehara, Takeyuki. "Contributions to image encryption and authentication." Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20040920.124409/index.html.
Full textVan, Dyken Jason Daniel. "Schemes to reduce power in FPGA implementations of the advanced encryption standard." Online access for everyone, 2007. http://www.dissertations.wsu.edu/Thesis/Fall2007/J_Van_Dyken_111307.pdf.
Full textMcDaniel, Larry T. III. "An Investigation of Differential Power Analysis Attacks on FPGA-based Encryption Systems." Thesis, Virginia Tech, 2003. http://hdl.handle.net/10919/33451.
Full textMaster of Science
Lopez, Samuel. "MODERN CRYPTOGRAPHY." CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/729.
Full textBut, Jason. "A novel MPEG-1 partial encryption scheme for the purposes of streaming video." Monash University, Dept. of Electrical and Computer Systems Engineering, 2004. http://arrow.monash.edu.au/hdl/1959.1/9709.
Full textVenema, Jacob Paul Shu Jonathan Lee Yee. "Investigation into the impacts of migration to emergent NSA Suite B encryption standards." Monterey, Calif. : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Jun/09Jun%5FVenema.pdf.
Full textThesis Advisor(s): Fulp, John D. ; Riehle, Richard. "June 2009." Description based on title screen as viewed on July 14, 2009. Author(s) subject terms: elliptical curve cryptography, ECC, Rivest Shamir and Adleman, RSA, NSA Suite B, encryption, digital signature, key agreement, ECC migration, risk mitigation. Includes bibliographical references (p. 95-98). Also available in print.
Books on the topic "Data Encryption Standard (DES)"
National Bureau of Standards. Data encryption standard. Gaithersburg, MD: U.S. Dept. of Commerce, National Bureau of Standards, 1988.
Find full textComputer Systems Laboratory (U.S.), ed. Data Encryption Standard (DES). Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Find full textComputer Systems Laboratory (U.S.), ed. Escrowed Encryption Standard (EES). Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Find full textBrute force: Cracking the data encryption standard. New York: Copernicus Books, 2005.
Find full textBiham, Eli, and Adi Shamir. Differential Cryptanalysis of the Data Encryption Standard. New York, NY: Springer New York, 1993. http://dx.doi.org/10.1007/978-1-4613-9314-6.
Full textBiham, Eli. Differential cryptanalysis of the data encryption standard. New York: Springer-Verlag, 1993.
Find full textInformation Technology Laboratory (National Institute of Standards and Technology). Announcing the Advanced Encryption Standard (AES). Gaithersburg, MD: Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2001.
Find full textIntroduction to the analysis of the data encryption standard (DES). Laguna Hills, CA: Aegean Park Press, 1991.
Find full textSimovits, Mikael J. The DES, an extensive documentation and evaluation of the Data Encryption Standard. Laguna Hills, Calif: Aegean Park Press, 1995.
Find full textBook chapters on the topic "Data Encryption Standard (DES)"
Weik, Martin H. "data encryption standard." In Computer Science and Communications Dictionary, 347. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_4267.
Full textDaemen, Joan, and Vincent Rijmen. "The Data Encryption Standard." In Information Security and Cryptography, 81–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/978-3-662-04722-4_6.
Full textDaemen, Joan, and Vincent Rijmen. "The Data Encryption Standard." In Information Security and Cryptography, 83–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-60769-5_6.
Full textBiryukov, Alex, and Christophe De Cannière. "Data Encryption Standard (DES)." In Encyclopedia of Cryptography and Security, 295–301. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_568.
Full textSchneier, Bruce. "Data Encryption Standard (DES)." In Applied Cryptography, Second Edition, 265–301. Indianapolis, Indiana: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119183471.ch12.
Full textKou, Weidong. "Data Encryption Standards." In Networking Security and Standards, 49–67. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-1-4615-6153-8_4.
Full textPelzl, Jan, and Christof Paar. "Der Data Encryption Standard und Alternativen." In Kryptografie verständlich, 63–101. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-49297-0_3.
Full textVerma, Jatin, and Sunita Prasad. "Security Enhancement in Data Encryption Standard." In Information Systems, Technology and Management, 325–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00405-6_34.
Full textAhlswede, Rudolf. "The Mathematical Background of the Advanced Encryption Standard." In Hiding Data - Selected Topics, 155–224. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31515-7_3.
Full textMiller, Michael. "Lucifer-Chiffre und der Data Encryption Standard." In Symmetrische Verschlüsselungsverfahren, 115–48. Wiesbaden: Vieweg+Teubner Verlag, 2003. http://dx.doi.org/10.1007/978-3-322-80101-2_4.
Full textConference papers on the topic "Data Encryption Standard (DES)"
Stanisavljevic, Zarko S. "Data encryption standard visual representation." In 2015 23rd Telecommunications Forum Telfor (TELFOR). IEEE, 2015. http://dx.doi.org/10.1109/telfor.2015.7377622.
Full textKaushik, Akhil, Anant Kumar, and Manoj Barnela. "Block Encryption Standard for Transfer of data." In 2010 International Conference on Networking and Information Technology (ICNIT 2010). IEEE, 2010. http://dx.doi.org/10.1109/icnit.2010.5508489.
Full textHaitao, Sun, He Xunlai, Zhao Qiang, and Chu Jie. "Differential Power Analysis for Data Encryption Standard." In 2007 8th International Conference on Electronic Measurement and Instruments. IEEE, 2007. http://dx.doi.org/10.1109/icemi.2007.4350472.
Full textAbdelwahab, Murtada M. "High performance FPGA implementation of Data encryption standard." In 2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCNEEE). IEEE, 2015. http://dx.doi.org/10.1109/iccneee.2015.7381424.
Full textGOPE, PROSANTA, D. GHOSH, A. R. KRISHNA CHELLURI, and PINAKI CHATTOPADHYAY. "MULTI OPERATOR DELIMITER BASED DATA ENCRYPTION STANDARD (MODDES)." In Proceedings of the International Conference on ICCNT 2009. WORLD SCIENTIFIC, 2009. http://dx.doi.org/10.1142/9789814289771_0031.
Full textSilva G., Victor Manuel. "A cryptanalysis procedure of the data encryption standard." In Optics & Photonics 2005, edited by Mark S. Schmalz. SPIE, 2005. http://dx.doi.org/10.1117/12.620955.
Full textPathak, Sonam, Rachana kamble, and Deepa Chaursia. "An efficient data encryption standard image encryption technique with RGB random uncertainty." In 2014 International Conference on Optimization, Reliabilty, and Information Technology (ICROIT). IEEE, 2014. http://dx.doi.org/10.1109/icroit.2014.6798366.
Full textPuchala, Dariusz, Kamil Stokfiszewski, and Mykhaylo Yatsymirskyy. "Encryption Before Compression Coding Scheme for JPEG Image Compression Standard." In 2020 Data Compression Conference (DCC). IEEE, 2020. http://dx.doi.org/10.1109/dcc47342.2020.00039.
Full textNeelam, Rohit, and Deepika Soni. "FPGA implementation of high speed triple data encryption standard." In 2016 International Conference on ICT in Business Industry & Government (ICTBIG). IEEE, 2016. http://dx.doi.org/10.1109/ictbig.2016.7892648.
Full textNalini, N., and G. Raghavendra Rao. "Cryptanalysis of Simplified Data Encryption Standard via Optimization Heuristics." In 2005 3rd International Conference on Intelligent Sensing and Information Processing. IEEE, 2005. http://dx.doi.org/10.1109/icisip.2005.1619415.
Full textReports on the topic "Data Encryption Standard (DES)"
Robertson, Perry J., Lyndon George Pierson, and Edward L. Witzke. Data encryption standard ASIC design and development report. Office of Scientific and Technical Information (OSTI), October 2003. http://dx.doi.org/10.2172/918309.
Full textKelly, S. Security Implications of Using the Data Encryption Standard (DES). RFC Editor, December 2006. http://dx.doi.org/10.17487/rfc4772.
Full textSchaad, J., and R. Housley. Wrapping a Hashed Message Authentication Code (HMAC) key with a Triple-Data Encryption Standard (DES) Key or an Advanced Encryption Standard (AES) Key. RFC Editor, May 2003. http://dx.doi.org/10.17487/rfc3537.
Full textRaeburn, K. Advanced Encryption Standard (AES) Encryption for Kerberos 5. RFC Editor, February 2005. http://dx.doi.org/10.17487/rfc3962.
Full textMouha, Nicky. Review of the Advanced Encryption Standard. National Institute of Standards and Technology, July 2021. http://dx.doi.org/10.6028/nist.ir.8319.
Full textHarkins, D. Synthetic Initialization Vector (SIV) Authenticated Encryption Using the Advanced Encryption Standard (AES). RFC Editor, October 2008. http://dx.doi.org/10.17487/rfc5297.
Full textSchaad, J., and R. Housley. Advanced Encryption Standard (AES) Key Wrap Algorithm. RFC Editor, September 2002. http://dx.doi.org/10.17487/rfc3394.
Full textTs'o, T. Telnet Data Encryption Option. RFC Editor, September 2000. http://dx.doi.org/10.17487/rfc2946.
Full textSchaad, J. Use of the Advanced Encryption Standard (AES) Encryption Algorithm in Cryptographic Message Syntax (CMS). RFC Editor, July 2003. http://dx.doi.org/10.17487/rfc3565.
Full textSoto, Juan Jr. Randomness testing of the advanced encryption standard candidate algorithms. Gaithersburg, MD: National Institute of Standards and Technology, 1999. http://dx.doi.org/10.6028/nist.ir.6390.
Full text