Academic literature on the topic 'Data Encryption Standard (DES)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data Encryption Standard (DES).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Data Encryption Standard (DES)"

1

Silva G., Víctor M., Eduardo Rodríguez Escobar, and Eduardo Vega Alvarado. "Criptografía: Data Encryption Standard." Polibits 30 (July 20, 2004): 3–5. http://dx.doi.org/10.17562/pb-30-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Coppersmith, Don, Chris Holloway, Stephen M. Matyas, and Nev Zunic. "The data encryption standard." Information Security Technical Report 2, no. 2 (January 1997): 22–24. http://dx.doi.org/10.1016/s1363-4127(97)81325-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Highland, HaroldJoseph. "Data encryption standard II?" Computers & Security 6, no. 3 (June 1987): 195–96. http://dx.doi.org/10.1016/0167-4048(87)90095-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

M, Jayasarathi, Rajeshwari S, Shiny Mercy I, and Rathika S.K.B. "Enhanced on Data Encryption Standard for Secured Cloud Storage." Bonfring International Journal of Software Engineering and Soft Computing 9, no. 1 (March 29, 2019): 07–10. http://dx.doi.org/10.9756/bijsesc.9004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Meixi. "Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm." Complexity 2021 (June 4, 2021): 1–12. http://dx.doi.org/10.1155/2021/7212688.

Full text
Abstract:
With the application of computer and network technology in the field of accounting, the development of accounting informationization is an inevitable trend, and the construction of accounting statement data into the data warehouse will be the basis of intelligent decision-making. The complexity of industry accounting statements and the arbitrariness and diversity of users’ needs for obtaining information using statements limit the development, popularization, and application of industry accounting statements. As a block encryption algorithm, the Data Encryption Standard (DES) algorithm uses 64-bit packet data for encryption and decryption. Each eighth bit of the key is used as a parity bit; that is, the actual key length is 56 bits. Encryption and decryption use the same algorithm structure, but the order in which the subkeys are used is reversed. Under the control of the subkey, inputting 64-bit plaintext can produce 64-bit ciphertext output; otherwise, inputting 64-bit ciphertext can produce 64-bit plaintext output. The confidentiality of the DES algorithm depends on the key, and only a very small number of keys are considered weak keys, which can be easily avoided in practical applications. The 3DES algorithm is a cascade of the DES algorithm, and its encryption process is based on the DES algorithm principle. This article explains the encryption process of the DES algorithm and introduces the composition of the 3DES algorithm. The experimental results show that the 3DES encryption algorithm still has a better encryption effect and “avalanche effect” than before the improvement. In addition, for the 3DES algorithm, its encryption efficiency has not been greatly affected. The 3DES encryption algorithm achieves one encryption process at a time to some extent, can effectively resist exhaustive search attacks, and enhance the security of the DES algorithm.
APA, Harvard, Vancouver, ISO, and other styles
6

Kasiran, Zolidah, Hikma Farah Ali, and Noorhayati Mohamed Noor. "Time performance analysis of advanced encryption standard and data encryption standard in data security transaction." Indonesian Journal of Electrical Engineering and Computer Science 16, no. 2 (November 1, 2019): 988. http://dx.doi.org/10.11591/ijeecs.v16.i2.pp988-994.

Full text
Abstract:
The advancement of the data communication technologies has increased the traffic of data exchange over the internet and at the same time created the opportunity of data attack by various party. This paper present Time Performance Analysis Of Advanced Encryption Standard And Data Encryption Standard in Data Security Transaction<strong>. </strong>In this study we proposed an AES algorithm with different key size, and different file format. Our aim is to safely to transfer the file for using the AES algorithm. Proposed algorithm has done by analyzing the different time taken for both AES and DES, experiments were done by three different file format which were text, image, and voice. Each file format type was tested with five different file sizes. The result of each experiments were analysed and it was confirmed that the AES algorithm have better performance in term of time taken as compared to DES.
APA, Harvard, Vancouver, ISO, and other styles
7

Kumar, Sanjay, and Sandeep Srivastava. "Image Encryption using Simplified Data Encryption Standard (S-DES)." International Journal of Computer Applications 104, no. 2 (October 18, 2014): 38–42. http://dx.doi.org/10.5120/18178-9070.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Okazaki, Hiroyuki, and Yasunari Shidama. "Formalization of the Data Encryption Standard." Formalized Mathematics 20, no. 2 (December 1, 2012): 125–46. http://dx.doi.org/10.2478/v10037-012-0016-y.

Full text
Abstract:
Summary In this article we formalize DES (the Data Encryption Standard), that was the most widely used symmetric cryptosystem in the world. DES is a block cipher which was selected by the National Bureau of Standards as an official Federal Information Processing Standard for the United States in 1976 [15].
APA, Harvard, Vancouver, ISO, and other styles
9

Et. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.

Full text
Abstract:
The emergence of cloud computing has completely changed the information technology sector, storage of information’s and access control. The main challenge in the migration of enterprises is the security to gain data owners confidence. In existing approach, many digital signatures based methodologies are used. In the existing approach, encryption time, security, encryption complexity are the parameters which need more focus. To overcome the existing issue, in this paper we proposed an hybrid architecture invoking attribute based encryption (ABE) for encrypting the key and advanced encryption standard (AES) for file encryption. Thus the proposed methodology provides security, confidentiality and optimizing storage and encryption cost
APA, Harvard, Vancouver, ISO, and other styles
10

Simran, Simran, and Parminder Singh Jassal. "Synthesis of 64-Bit Triple Data Encryption Standard Algorithm using VHDL." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (June 30, 2018): 775–78. http://dx.doi.org/10.31142/ijtsrd14159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Data Encryption Standard (DES)"

1

Meissner, Robert. "Data Encryption Standard." Universitätsbibliothek Chemnitz, 2002. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200200590.

Full text
Abstract:
Die heutige Informationsgesellschaft hat die Formen des menschlichen Handelns in vielen Bereichen des taeglichen Lebens veraendert. Die Moeglichkeit, Informationen über das Internet auszutauschen, draengt konventionelle Kommunikationsformen immer mehr in den Hintergrund. Gerade in den Bereichen eBusiness und ePayment, welche aufgrund der zunehmenden Globalisierung unabdingbar sind, spielen dabei die Sicherheit und die Authentitaet der uebertragenen Daten eine wichtige Rolle. Meine Seminararbeit stellt den Data Encryption Standard (DES) in seiner Funktionsweise vor, diskutiert kritisch dessen Sicherheit und gibt einen Ausblick auf neue Verschluesselungstechnologien, welche im Begriff sind, den Data Encryption Standard und seine verschiedenen Versionen abzuloesen.
APA, Harvard, Vancouver, ISO, and other styles
2

Meißner, Robert. "Data Encryption Standard (DES) [Einführung, Funktionsweise, Risiken, Alternativen] /." [S.l. : s.n.], 2002. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB10324753.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mantzouris, Panteleimon. "Computational algebraic attacks on the Advanced Encryption Standard (AES)." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FMantzouris.pdf.

Full text
Abstract:
Thesis (M.S. in Electrical Engineering and M.S.in Applied Mathematics)--Naval Postgraduate School, September 2009.
Thesis Advisor(s): Canright, David ; Butler, Jon. "September 2009." Description based on title screen as viewed on 5 November 2009. Author(s) subject terms: Advanced Encryption Standard (AES), Rijndael's algorithm, block cipher, decipher, round of the algorithm, sparse multivariate polynomial. Includes bibliographical references (p. 101). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
4

Tandon, Prateek. "High-performance advanced encryption standard (AES) security co-processor design." Thesis, Available online, Georgia Institute of Technology, 2004:, 2003. http://etd.gatech.edu/theses/available/etd-04082004-180433/unrestricted/tandon%5fprateek%5f200312%5fms.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Uehara, Takeyuki. "Contributions to image encryption and authentication." Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20040920.124409/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Van, Dyken Jason Daniel. "Schemes to reduce power in FPGA implementations of the advanced encryption standard." Online access for everyone, 2007. http://www.dissertations.wsu.edu/Thesis/Fall2007/J_Van_Dyken_111307.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

McDaniel, Larry T. III. "An Investigation of Differential Power Analysis Attacks on FPGA-based Encryption Systems." Thesis, Virginia Tech, 2003. http://hdl.handle.net/10919/33451.

Full text
Abstract:
Hardware devices implementing cryptographic algorithms are finding their way into many applications. As this happens, the ability to keep the data being processed or stored on the device secure grows more important. Power analysis attacks involve cryptographic hardware leaking information during encryption because power consumption is correlated to the key used for encryption. Power analysis attacks have proven successful against public and private key cryptosystems in a variety of form factors. The majority of the countermeasures that have been proposed for this attack are intended for software implementations on a microcontroller. This project focuses on the development of a VHDL tool for investigating power analysis attacks on FPGAs and exploring countermeasures that might be used. The tool developed here counted the transitions of CLB output signals to estimate power and was used to explore the impact of possible gate-level countermeasures to differential power analysis. Using this tool, it was found that only a few nodes in the circuit have a high correlation to bits of the key. This means that modifying only a small portion of the circuit could dramatically increase the difficulty of mounting a differential power analysis attack on the hardware. Further investigation of the correlation between CLB outputs and the key showed that a tradeoff exists between the amount of space required for decorrelation versus the amount of decorrelation that is desired, allowing a designer to determine the amount of correlation that can be removed for available space. Filtering of glitches on CLB output signals slightly reduced the amount of correlation each CLB had. Finally, a decorrelation circuit was proposed and shown capable of decorrelating flip-flop outputs of a CLB, which account for less than 10% of the CLB outputs signals.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
8

Lopez, Samuel. "MODERN CRYPTOGRAPHY." CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/729.

Full text
Abstract:
We live in an age where we willingly provide our social security number, credit card information, home address and countless other sensitive information over the Internet. Whether you are buying a phone case from Amazon, sending in an on-line job application, or logging into your on-line bank account, you trust that the sensitive data you enter is secure. As our technology and computing power become more sophisticated, so do the tools used by potential hackers to our information. In this paper, the underlying mathematics within ciphers will be looked at to understand the security of modern ciphers. An extremely important algorithm in today's practice is the Advanced Encryption Standard (AES), which is used by our very own National Security Agency (NSA) for data up to TOP SECRET. Another frequently used cipher is the RSA cryptosystem. Its security is based on the concept of prime factorization, and the fact that it is a hard problem to prime factorize huge numbers, numbers on the scale of 2^{2048} or larger. Cryptanalysis, the study of breaking ciphers, will also be studied in this paper. Understanding effective attacks leads to understanding the construction of these very secure ciphers.
APA, Harvard, Vancouver, ISO, and other styles
9

But, Jason. "A novel MPEG-1 partial encryption scheme for the purposes of streaming video." Monash University, Dept. of Electrical and Computer Systems Engineering, 2004. http://arrow.monash.edu.au/hdl/1959.1/9709.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Venema, Jacob Paul Shu Jonathan Lee Yee. "Investigation into the impacts of migration to emergent NSA Suite B encryption standards." Monterey, Calif. : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Jun/09Jun%5FVenema.pdf.

Full text
Abstract:
Thesis (M.S. in Systems Technology (Command, Control & Communications (C3)))--Naval Postgraduate School, June 2009 by Jacob P. Venema. Thesis (M.S. in Software Engineering)--Naval Postgraduate School, June 2009 by Jonahan Lee Yee Shu.
Thesis Advisor(s): Fulp, John D. ; Riehle, Richard. "June 2009." Description based on title screen as viewed on July 14, 2009. Author(s) subject terms: elliptical curve cryptography, ECC, Rivest Shamir and Adleman, RSA, NSA Suite B, encryption, digital signature, key agreement, ECC migration, risk mitigation. Includes bibliographical references (p. 95-98). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Data Encryption Standard (DES)"

1

National Bureau of Standards. Data encryption standard. Gaithersburg, MD: U.S. Dept. of Commerce, National Bureau of Standards, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Computer Systems Laboratory (U.S.), ed. Data Encryption Standard (DES). Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Computer Systems Laboratory (U.S.), ed. Escrowed Encryption Standard (EES). Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Brute force: Cracking the data encryption standard. New York: Copernicus Books, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Biham, Eli, and Adi Shamir. Differential Cryptanalysis of the Data Encryption Standard. New York, NY: Springer New York, 1993. http://dx.doi.org/10.1007/978-1-4613-9314-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Biham, Eli. Differential cryptanalysis of the data encryption standard. New York: Springer-Verlag, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Information Technology Laboratory (National Institute of Standards and Technology). Announcing the Advanced Encryption Standard (AES). Gaithersburg, MD: Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Introduction to the analysis of the data encryption standard (DES). Laguna Hills, CA: Aegean Park Press, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Data breach and encryption handbook. Chicago: American Bar Association, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Simovits, Mikael J. The DES, an extensive documentation and evaluation of the Data Encryption Standard. Laguna Hills, Calif: Aegean Park Press, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Data Encryption Standard (DES)"

1

Weik, Martin H. "data encryption standard." In Computer Science and Communications Dictionary, 347. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_4267.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Daemen, Joan, and Vincent Rijmen. "The Data Encryption Standard." In Information Security and Cryptography, 81–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/978-3-662-04722-4_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Daemen, Joan, and Vincent Rijmen. "The Data Encryption Standard." In Information Security and Cryptography, 83–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-60769-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Biryukov, Alex, and Christophe De Cannière. "Data Encryption Standard (DES)." In Encyclopedia of Cryptography and Security, 295–301. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_568.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Schneier, Bruce. "Data Encryption Standard (DES)." In Applied Cryptography, Second Edition, 265–301. Indianapolis, Indiana: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119183471.ch12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kou, Weidong. "Data Encryption Standards." In Networking Security and Standards, 49–67. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-1-4615-6153-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pelzl, Jan, and Christof Paar. "Der Data Encryption Standard und Alternativen." In Kryptografie verständlich, 63–101. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-49297-0_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Verma, Jatin, and Sunita Prasad. "Security Enhancement in Data Encryption Standard." In Information Systems, Technology and Management, 325–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00405-6_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ahlswede, Rudolf. "The Mathematical Background of the Advanced Encryption Standard." In Hiding Data - Selected Topics, 155–224. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31515-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Miller, Michael. "Lucifer-Chiffre und der Data Encryption Standard." In Symmetrische Verschlüsselungsverfahren, 115–48. Wiesbaden: Vieweg+Teubner Verlag, 2003. http://dx.doi.org/10.1007/978-3-322-80101-2_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Data Encryption Standard (DES)"

1

Stanisavljevic, Zarko S. "Data encryption standard visual representation." In 2015 23rd Telecommunications Forum Telfor (TELFOR). IEEE, 2015. http://dx.doi.org/10.1109/telfor.2015.7377622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kaushik, Akhil, Anant Kumar, and Manoj Barnela. "Block Encryption Standard for Transfer of data." In 2010 International Conference on Networking and Information Technology (ICNIT 2010). IEEE, 2010. http://dx.doi.org/10.1109/icnit.2010.5508489.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Haitao, Sun, He Xunlai, Zhao Qiang, and Chu Jie. "Differential Power Analysis for Data Encryption Standard." In 2007 8th International Conference on Electronic Measurement and Instruments. IEEE, 2007. http://dx.doi.org/10.1109/icemi.2007.4350472.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Abdelwahab, Murtada M. "High performance FPGA implementation of Data encryption standard." In 2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCNEEE). IEEE, 2015. http://dx.doi.org/10.1109/iccneee.2015.7381424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

GOPE, PROSANTA, D. GHOSH, A. R. KRISHNA CHELLURI, and PINAKI CHATTOPADHYAY. "MULTI OPERATOR DELIMITER BASED DATA ENCRYPTION STANDARD (MODDES)." In Proceedings of the International Conference on ICCNT 2009. WORLD SCIENTIFIC, 2009. http://dx.doi.org/10.1142/9789814289771_0031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Silva G., Victor Manuel. "A cryptanalysis procedure of the data encryption standard." In Optics & Photonics 2005, edited by Mark S. Schmalz. SPIE, 2005. http://dx.doi.org/10.1117/12.620955.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pathak, Sonam, Rachana kamble, and Deepa Chaursia. "An efficient data encryption standard image encryption technique with RGB random uncertainty." In 2014 International Conference on Optimization, Reliabilty, and Information Technology (ICROIT). IEEE, 2014. http://dx.doi.org/10.1109/icroit.2014.6798366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Puchala, Dariusz, Kamil Stokfiszewski, and Mykhaylo Yatsymirskyy. "Encryption Before Compression Coding Scheme for JPEG Image Compression Standard." In 2020 Data Compression Conference (DCC). IEEE, 2020. http://dx.doi.org/10.1109/dcc47342.2020.00039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Neelam, Rohit, and Deepika Soni. "FPGA implementation of high speed triple data encryption standard." In 2016 International Conference on ICT in Business Industry & Government (ICTBIG). IEEE, 2016. http://dx.doi.org/10.1109/ictbig.2016.7892648.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nalini, N., and G. Raghavendra Rao. "Cryptanalysis of Simplified Data Encryption Standard via Optimization Heuristics." In 2005 3rd International Conference on Intelligent Sensing and Information Processing. IEEE, 2005. http://dx.doi.org/10.1109/icisip.2005.1619415.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Data Encryption Standard (DES)"

1

Robertson, Perry J., Lyndon George Pierson, and Edward L. Witzke. Data encryption standard ASIC design and development report. Office of Scientific and Technical Information (OSTI), October 2003. http://dx.doi.org/10.2172/918309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kelly, S. Security Implications of Using the Data Encryption Standard (DES). RFC Editor, December 2006. http://dx.doi.org/10.17487/rfc4772.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Schaad, J., and R. Housley. Wrapping a Hashed Message Authentication Code (HMAC) key with a Triple-Data Encryption Standard (DES) Key or an Advanced Encryption Standard (AES) Key. RFC Editor, May 2003. http://dx.doi.org/10.17487/rfc3537.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Raeburn, K. Advanced Encryption Standard (AES) Encryption for Kerberos 5. RFC Editor, February 2005. http://dx.doi.org/10.17487/rfc3962.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mouha, Nicky. Review of the Advanced Encryption Standard. National Institute of Standards and Technology, July 2021. http://dx.doi.org/10.6028/nist.ir.8319.

Full text
Abstract:
The field of cryptography continues to advance at a very rapid pace, leading to new insights that may impact the security properties of cryptographic algorithms. The Crypto Publication Review Board ("the Board") has been established to identify publications to be reviewed. This report subjects the first standard to the review process: Federal Information Processing Standard (FIPS) 197, which defines the Advanced Encryption Standard (AES).
APA, Harvard, Vancouver, ISO, and other styles
6

Harkins, D. Synthetic Initialization Vector (SIV) Authenticated Encryption Using the Advanced Encryption Standard (AES). RFC Editor, October 2008. http://dx.doi.org/10.17487/rfc5297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Schaad, J., and R. Housley. Advanced Encryption Standard (AES) Key Wrap Algorithm. RFC Editor, September 2002. http://dx.doi.org/10.17487/rfc3394.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ts'o, T. Telnet Data Encryption Option. RFC Editor, September 2000. http://dx.doi.org/10.17487/rfc2946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Schaad, J. Use of the Advanced Encryption Standard (AES) Encryption Algorithm in Cryptographic Message Syntax (CMS). RFC Editor, July 2003. http://dx.doi.org/10.17487/rfc3565.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Soto, Juan Jr. Randomness testing of the advanced encryption standard candidate algorithms. Gaithersburg, MD: National Institute of Standards and Technology, 1999. http://dx.doi.org/10.6028/nist.ir.6390.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography