Journal articles on the topic 'Data Encryption Standard'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Data Encryption Standard.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Silva G., Víctor M., Eduardo Rodríguez Escobar, and Eduardo Vega Alvarado. "Criptografía: Data Encryption Standard." Polibits 30 (July 20, 2004): 3–5. http://dx.doi.org/10.17562/pb-30-1.
Full textCoppersmith, Don, Chris Holloway, Stephen M. Matyas, and Nev Zunic. "The data encryption standard." Information Security Technical Report 2, no. 2 (January 1997): 22–24. http://dx.doi.org/10.1016/s1363-4127(97)81325-8.
Full textHighland, HaroldJoseph. "Data encryption standard II?" Computers & Security 6, no. 3 (June 1987): 195–96. http://dx.doi.org/10.1016/0167-4048(87)90095-2.
Full textM, Jayasarathi, Rajeshwari S, Shiny Mercy I, and Rathika S.K.B. "Enhanced on Data Encryption Standard for Secured Cloud Storage." Bonfring International Journal of Software Engineering and Soft Computing 9, no. 1 (March 29, 2019): 07–10. http://dx.doi.org/10.9756/bijsesc.9004.
Full textChen, Meixi. "Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm." Complexity 2021 (June 4, 2021): 1–12. http://dx.doi.org/10.1155/2021/7212688.
Full textM. Shafiq Surameery, Nigar. "Modified Advanced Encryption Standard for Boost Image Encryption." UHD Journal of Science and Technology 6, no. 1 (April 27, 2022): 52–59. http://dx.doi.org/10.21928/uhdjst.v6n1y2022.pp52-59.
Full textKasiran, Zolidah, Hikma Farah Ali, and Noorhayati Mohamed Noor. "Time performance analysis of advanced encryption standard and data encryption standard in data security transaction." Indonesian Journal of Electrical Engineering and Computer Science 16, no. 2 (November 1, 2019): 988. http://dx.doi.org/10.11591/ijeecs.v16.i2.pp988-994.
Full textKumar, Sanjay, and Sandeep Srivastava. "Image Encryption using Simplified Data Encryption Standard (S-DES)." International Journal of Computer Applications 104, no. 2 (October 18, 2014): 38–42. http://dx.doi.org/10.5120/18178-9070.
Full textEt. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.
Full textOkazaki, Hiroyuki, and Yasunari Shidama. "Formalization of the Data Encryption Standard." Formalized Mathematics 20, no. 2 (December 1, 2012): 125–46. http://dx.doi.org/10.2478/v10037-012-0016-y.
Full textGaur, Paavni. "AES Image Encryption (Advanced Encryption Standard)." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (December 31, 2021): 1357–63. http://dx.doi.org/10.22214/ijraset.2021.39542.
Full textAlslman, Yasmeen, Eman Alnagi, Ashraf Ahmad, Yousef AbuHour, Remah Younisse, and Qasem Abu Al-haija. "Hybrid Encryption Scheme for Medical Imaging Using AutoEncoder and Advanced Encryption Standard." Electronics 11, no. 23 (November 30, 2022): 3967. http://dx.doi.org/10.3390/electronics11233967.
Full textSchaefer, Edward F. "A SIMPLIFIED DATA ENCRYPTION STANDARD ALGORITHM." Cryptologia 20, no. 1 (January 1996): 77–84. http://dx.doi.org/10.1080/0161-119691884799.
Full textMenkus, Belden. "Re-examining the Data Encryption Standard." Computers & Security 11, no. 8 (December 1992): 703–6. http://dx.doi.org/10.1016/0167-4048(92)90089-a.
Full textSmid, M. E., and D. K. Branstad. "Data Encryption Standard: past and future." Proceedings of the IEEE 76, no. 5 (May 1988): 550–59. http://dx.doi.org/10.1109/5.4441.
Full textR. Arboleda, Edwin, Joel L. Balaba, and John Carlo L. Espineli. "Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Scheduling." Bulletin of Electrical Engineering and Informatics 6, no. 3 (September 1, 2017): 219–27. http://dx.doi.org/10.11591/eei.v6i3.627.
Full textSimran, Simran, and Parminder Singh Jassal. "Synthesis of 64-Bit Triple Data Encryption Standard Algorithm using VHDL." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (June 30, 2018): 775–78. http://dx.doi.org/10.31142/ijtsrd14159.
Full textPriyanto, Dadang, and Raesul Azhar. "Sistem Aplikasi Untuk Keamanan Data Dengan Algoritma 'Des' (Data Encryption Standard)." Jurnal Matrik 16, no. 1 (July 26, 2017): 67. http://dx.doi.org/10.30812/matrik.v16i1.12.
Full textBenzegane, S., S. Sadoudi, and M. Djeddou. "Hyperchaos-Based Cryptosystem for Multimedia Data Security." Algerian Journal of Signals and Systems 1, no. 1 (February 1, 2021): 47–58. http://dx.doi.org/10.51485/ajss.v1i1.18.
Full textParenreng, Jumadi Mabe, Sahraeni Maulida Mustari, and Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm." Internet of Things and Artificial Intelligence Journal 2, no. 1 (February 16, 2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.
Full textPutrodjojo, Gunawan, Julhan H. Purba, and Junawano Candra. "APLIKASI ALGORITMA DES (DATA ENCRYPTION STANDARD) UNTUK PENGAMAN DATA." CCIT Journal 10, no. 1 (February 1, 2017): 62–74. http://dx.doi.org/10.33050/ccit.v10i1.518.
Full textMokhtar, M. Amr. "High Performance Data Encryption based on Advanced Encryption Standard using FPGA." IOSR Journal of Computer Engineering 16, no. 6 (2014): 07–13. http://dx.doi.org/10.9790/0661-16650713.
Full textMohammed Salih, Salih. "Modified Key Model of Data Encryption Standard." Anbar Journal of Engineering Sciences 3, no. 1 (May 1, 2010): 20–33. http://dx.doi.org/10.37649/aengs.2010.14266.
Full textMuhajer Kareem, Suhad, and Abdul Monem S. Rahma. "Development of data encryption standard algorithm based on magic square." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 1 (October 1, 2022): 297. http://dx.doi.org/10.11591/ijeecs.v28.i1.pp297-305.
Full textSyahputri, Nita. "RANCANG BANGUN APLIKASI KRIPTOGRAFI PENGAMANAN TRANSMISI DATA MULTIMEDIA MENGGUNAKAN ALGORITMA DATA ENCRYPTION STANDARD (DES)." Majalah Ilmiah METHODA 9, no. 2 (August 31, 2019): 57–63. http://dx.doi.org/10.46880/methoda.vol9no2.pp57-63.
Full textHagras, Tarek, Doaa Salama, and Hassan Youness. "Anti-attacks encryption algorithm based on DNA computing and data encryption standard." Alexandria Engineering Journal 61, no. 12 (December 2022): 11651–62. http://dx.doi.org/10.1016/j.aej.2022.05.033.
Full textTahir, Ari Shawkat. "A Modified Advanced Encryption Standard Algorithm for Image Encryption." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 11 (August 14, 2015): 6258–67. http://dx.doi.org/10.24297/ijct.v14i11.1811.
Full textYu, Yang, and Shi Min Wang. "The IC Card Data Encryption Research Based on the AES Algorithm." Applied Mechanics and Materials 220-223 (November 2012): 2698–701. http://dx.doi.org/10.4028/www.scientific.net/amm.220-223.2698.
Full textWicaksana, Ismaya Khusnu, Panji Wisnu Wirawan, and Putut Sri Wasito. "Implementasi Pengamanan MP3 Menggunakan Advanced Encryption Standard." JURNAL MASYARAKAT INFORMATIKA 10, no. 1 (June 9, 2019): 28–36. http://dx.doi.org/10.14710/jmasif.10.1.31491.
Full textS.More, Sharmila, Bhawna Narain, and B. T. Jadhav . "Data Encryption Standard Algorithm in Multimodal Biometric Image." International Journal of Computer Sciences and Engineering 6, no. 8 (August 31, 2018): 869–74. http://dx.doi.org/10.26438/ijcse/v6i8.869874.
Full textChen, Zhihua, and Xiutang Geng. "Efficient DNA Sticker Algorithms to Data Encryption Standard." Journal of Computational and Theoretical Nanoscience 7, no. 5 (May 1, 2010): 840–47. http://dx.doi.org/10.1166/jctn.2010.1429.
Full textPratistha, Indra, and Paholo Iman Prakoso. "Sistem Keamanan Data Text Dengan Data Encryption Standard (DES) Dan Metode Least Significant Bit (LSB)." Jurnal Sistem Informasi dan Komputer Terapan Indonesia (JSIKTI) 1, no. 2 (December 31, 2018): 11–20. http://dx.doi.org/10.33173/jsikti.16.
Full textPermana, Angga Aditya, and Desi Nurnaningsih. "APPLICATION OF CRYPTOGRAPHY WITH DATA ENCRYPTION STANDARD (DES) ALGORITHM IN PICTURE." JIKA (Jurnal Informatika) 4, no. 2 (May 31, 2020): 9. http://dx.doi.org/10.31000/jika.v4i2.2640.
Full textAdil Yazdeen, Abdulmajeed, Subhi R. M. Zeebaree, Mohammed Mohammed Sadeeq, Shakir Fattah Kak, Omar M. Ahmed, and Rizgar R. Zebari. "FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review." Qubahan Academic Journal 1, no. 2 (March 15, 2021): 8–16. http://dx.doi.org/10.48161/qaj.v1n2a38.
Full textParthasarathy, Rajamohan, Seow Soon Loong, and Preethy Ayyappan. "An Efficient Encryption Implementation Using AES Algorithm Techniques." Journal of Engineering & Technological Advances 3, no. 1 (2018): 61–70. http://dx.doi.org/10.35934/segi.v3i1.61.
Full textNurdin, Dahlan Abdullah, Widia Fatimah, R. Ratnadewi, Nuning Kurniasih, Dian Rianita, Berliana Kusuma Riasti, et al. "Sms Encryption Application Using 3Des (Triple Data Encryption Standard) Algorithm Based on Android." Journal of Physics: Conference Series 1363 (November 2019): 012077. http://dx.doi.org/10.1088/1742-6596/1363/1/012077.
Full textOukili, Soufiane, and Seddik Bri. "High throughput FPGA Implementation of Data Encryption Standard with time variable sub-keys." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 1 (February 1, 2016): 298. http://dx.doi.org/10.11591/ijece.v6i1.8388.
Full textOukili, Soufiane, and Seddik Bri. "High throughput FPGA Implementation of Data Encryption Standard with time variable sub-keys." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 1 (February 1, 2016): 298. http://dx.doi.org/10.11591/ijece.v6i1.pp298-306.
Full textRatnadewi, Roy Pramono Adhie, Yonatan Hutama, A. Saleh Ahmar, and M. I. Setiawan. "Implementation Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES) Method in Communication System Based Near Field Communication (NFC)." Journal of Physics: Conference Series 954 (January 2018): 012009. http://dx.doi.org/10.1088/1742-6596/954/1/012009.
Full textNeelima, S., and R. Brinda. "Implementation of various data encryption methods for medical information transmission." International Journal of Engineering & Technology 7, no. 2.31 (May 29, 2018): 219. http://dx.doi.org/10.14419/ijet.v7i2.31.13446.
Full textSingh, Pankaj, and Sachin Kumar. "Study & analysis of cryptography algorithms : RSA, AES, DES, T-DES, blowfish." International Journal of Engineering & Technology 7, no. 1.5 (December 31, 2017): 221. http://dx.doi.org/10.14419/ijet.v7i1.5.9150.
Full textKumar, Dr M. Jaya, and Mr R. Nandha Kumar. "Double Way Protection of Trible Data Encryption Standard Algorithm." IJARCCE 5, no. 12 (December 30, 2016): 56–61. http://dx.doi.org/10.17148/ijarcce.2016.51211.
Full textKannan, M. "Ultra Encryption Standard algorithm Based Data Security in WSN." Indian Journal of Public Health Research & Development 9, no. 2 (2018): 466. http://dx.doi.org/10.5958/0976-5506.2018.00170.5.
Full textYanti, Neti Rusri, Alimah Alimah, and Desi Afrida Ritonga. "Implementasi Algoritma Data Encryption Standard Pada Penyandian Record Database." J-SAKTI (Jurnal Sains Komputer dan Informatika) 2, no. 1 (March 27, 2018): 23. http://dx.doi.org/10.30645/j-sakti.v2i1.53.
Full textADLEMAN, LEONARD M., PAUL W. K. ROTHEMUND, SAM ROWEIS, and ERIK WINFREE. "On Applying Molecular Computation to the Data Encryption Standard." Journal of Computational Biology 6, no. 1 (January 1999): 53–63. http://dx.doi.org/10.1089/cmb.1999.6.53.
Full textGarg, Purvi. "Cryptanalysis of Simplified Data Encryption Standard Using Genetic Algorithm." American Journal of Networks and Communications 4, no. 3 (2015): 32. http://dx.doi.org/10.11648/j.ajnc.20150403.12.
Full textRabah, Kefa. "Theory and Implementation of Data Encryption Standard: A Review." Information Technology Journal 4, no. 4 (September 15, 2005): 307–25. http://dx.doi.org/10.3923/itj.2005.307.325.
Full textNawazKhan, Muhammad, Ishtiaq Wahid, and Atual Aziz Ikram. "The FastDES: A New Look of Data Encryption Standard." International Journal of Computer Applications 39, no. 11 (December 29, 2012): 28–33. http://dx.doi.org/10.5120/4865-7249.
Full textSharma, Samiksha, and Vinay Chopra. "Data Encryption using Advanced Encryption Standard with Key Generation by Elliptic Curve Diffie-Hellman." International Journal of Security and Its Applications 11, no. 3 (March 31, 2017): 17–28. http://dx.doi.org/10.14257/ijsia.2017.11.3.02.
Full textZhang, Xiaoqiang, and Xuesong Wang. "Remote-Sensing Image Encryption Algorithm Using the Advanced Encryption Standard." Applied Sciences 8, no. 9 (September 3, 2018): 1540. http://dx.doi.org/10.3390/app8091540.
Full text