Journal articles on the topic 'Rijindael Cipher Key (128 bit)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Rijindael Cipher Key (128 bit).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Alyaa, Ghanim Sulaiman, and Salim Mahmood AlDabbagh Sufyan. "Modified 128-EEA2 Algorithm by Using HISEC Lightweight Block CipherAlgorithm with Improving the Security and Cost Factors." Indonesian Journal of Electrical Engineering and Computer Science 10, no. 1 (2018): 337–42. https://doi.org/10.11591/ijeecs.v10.i1.pp337-342.
Full textSidik, Agung Purnomo. "Algoritma Hybrid dengan Kombinasi Elgamal Algorithm dan Electronic Code Book untuk Mengatasi Masalah Key Distribution." JURNAL UNITEK 15, no. 2 (2022): 114–22. http://dx.doi.org/10.52072/unitek.v15i2.309.
Full textNagnath, B. Hulle, B. Prathiba, and R. Khope Sarika. "Compact Reconfigurable Architecture for Sosemanuk Stream Cipher." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 607–11. https://doi.org/10.35940/ijeat.C5252.029320.
Full textGhanim Sulaiman, Alyaa, and Sufyan Salim Mahmood AlDabbagh. "Modified 128-EEA2 Algorithm by Using HISEC Lightweight Block Cipher Algorithm with Improving the Security and Cost Factors." Indonesian Journal of Electrical Engineering and Computer Science 10, no. 1 (2018): 337. http://dx.doi.org/10.11591/ijeecs.v10.i1.pp337-342.
Full textRobbi, Rahim, and Ikhwan Ali. "Cryptography Technique with Modular Multiplication Block Cipher and Playfair Cipher." International Journal of Scientific Research in Science and Technology (IJSRST) 2, no. 6 (2016): 71–78. https://doi.org/10.5281/zenodo.239080.
Full textAnanth, Raghavendra, Panduranga Rao Malode V., and Narayana Swamy Ramaiah. "Hardware-based efficient Mickey-128 stream cipher with unrolling factors for throughput enhancement." Bulletin of Electrical Engineering and Informatics 14, no. 1 (2025): 388–97. http://dx.doi.org/10.11591/eei.v14i1.8270.
Full textTew, Jia Jian, Chia Yee Ooi, and Yeam Tan Chong. "Compact Hardware Implementation Of The CLEFIA Block Cipher." Journal of Advanced Research in Computing and Applications 30, no. 1 (2024): 1–6. http://dx.doi.org/10.37934/arca.30.1.16.
Full textAhmed, Abd Ali Abdulkadhim, Nadir George Dena, and Mohammed Radi Arkan. "Subject Review: Data Encryption using Block Cipher Algorithm." International Journal of Computer Science and Mobile Applications (IJCSMA) 10, no. 8 (2022): 42–50. https://doi.org/10.5281/zenodo.6992617.
Full textNaik, Mahendra Shridhar, Desai Karanam Sreekantha, and Kanduri VSSSS Sairam. "Enabling low-latency IoT communication for resource-constrained devices with the led cipher and decipher protocol." Indonesian Journal of Electrical Engineering and Computer Science 34, no. 2 (2024): 1170. http://dx.doi.org/10.11591/ijeecs.v34.i2.pp1170-1180.
Full textNaik, Mahendra Shridhar, Desai Karanam Sreekantha, and Kanduri VSSSS Sairam. "Enabling low-latency IoT communication for resource-constrained devices with the led cipher and decipher protocol." Indonesian Journal of Electrical Engineering and Computer Science 34, no. 2 (2024): 1170–80. https://doi.org/10.11591/ijeecs.v34.i2.pp1170-1180.
Full textN., B. Hulle, B. Prathiba, R. Khope Sarika, Anuradha K., Borole Yogini, and Kotambka D. "Optimized architecture for SNOW 3G." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 1 (2021): 545–57. https://doi.org/10.11591/ijece.v11i1.pp545-557.
Full textMinh, Nguyen Hieu, Do Thi Bac, Hoang Ngoc Canh, Cong Tran Manh, Duong Phuc Phan, and Nguyen Tuan Khoa. "HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS NETWORKS." International Journal of Computer Networks & Communications (IJCNC) 12, july (2020): 55–70. https://doi.org/10.5121/ijcnc.2020.12404.
Full textMuslih, Muslih, Abdussalam Abdussalam, and Elkaf Rahmawan Pramudya. "Securitary Text on Images with RC-128 Bit Synthric Key Encryption." Journal of Applied Intelligent System 6, no. 2 (2021): 94–102. http://dx.doi.org/10.33633/jais.v6i2.4620.
Full textHulle, N. B., Prathiba B., Sarika R. Khope, K. Anuradha, Yogini Borole, and D. Kotambkar. "Optimized architecture for SNOW 3G." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 1 (2021): 545. http://dx.doi.org/10.11591/ijece.v11i1.pp545-557.
Full textSwain, Gandharba, and Saroj Kumar Lenka. "A Dynamic Approach to Image Steganography Using the Three Least Significant Bits and Extended Hill Cipher." Advanced Materials Research 403-408 (November 2011): 842–49. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.842.
Full textOmar, A. Dawood. "Fast lightweight block cipher design with involution substitution permutation network (SPN) structure." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 1 (2020): 361–69. https://doi.org/10.11591/ijeecs.v20.i1.pp361-369.
Full textIndrayani, Lilik Asih, and I. Made Suartana. "Implementasi Kriptografi dengan Modifikasi Algoritma Advanced Encryption Standard (AES) untuk Pengamanan File Document." Journal of Informatics and Computer Science (JINACS) 1, no. 01 (2019): 42–47. http://dx.doi.org/10.26740/jinacs.v1n01.p42-47.
Full textLiu, Ya, Yifan Shi, Dawu Gu, et al. "Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC." Computer Journal 62, no. 12 (2019): 1761–76. http://dx.doi.org/10.1093/comjnl/bxz059.
Full textImdad, Maria, Sofia Najwa Ramli, and Hairulnizam Mahdin. "An Enhanced Key Schedule Algorithm of PRESENT-128 Block Cipher for Random and Non-Random Secret Keys." Symmetry 14, no. 3 (2022): 604. http://dx.doi.org/10.3390/sym14030604.
Full textA. Dawood, Omar. "Fast lightweight block cipher design with involution substitution permutation network (SPN) structure." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 1 (2020): 361. http://dx.doi.org/10.11591/ijeecs.v20.i1.pp361-369.
Full textTeh, Je Sen, and Azman Samsudin. "A Chaos-Based Authenticated Cipher with Associated Data." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/9040518.
Full textTheda, Flare G. Quilala, M. Sison Ariel, and P. Medina Ruji. "Modified Blowfish Algorithm." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 1 (2018): 38–45. https://doi.org/10.11591/ijeecs.v12.i1.pp38-45.
Full textSeo, Hwajeong, Hyeokdong Kwon, Hyunji Kim, and Jaehoon Park. "ACE: ARIA-CTR Encryption for Low-End Embedded Processors." Sensors 20, no. 13 (2020): 3788. http://dx.doi.org/10.3390/s20133788.
Full textDing, Lin, Chenhui Jin, Jie Guan, and Qiuyan Wang. "Cryptanalysis of Loiss Stream Cipher-Revisited." Journal of Applied Mathematics 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/457275.
Full textNgo, Chi Trung, Jason K. Eshraghian, and Jong-Phil Hong. "An Area-Optimized and Power-Efficient CBC-PRESENT and HMAC-PHOTON." Electronics 11, no. 15 (2022): 2380. http://dx.doi.org/10.3390/electronics11152380.
Full textSong, Gyeongju, Kyoungbae Jang, Hyunjun Kim, et al. "SPEEDY Quantum Circuit for Grover’s Algorithm." Applied Sciences 12, no. 14 (2022): 6870. http://dx.doi.org/10.3390/app12146870.
Full textTripathy, Alakananda, Sateesh Kumar Pradhan, Ajit Kumar Nayak, Smita Rath, and Alok Ranjan Tripathy. "Integration of PRESENT Cipher Model Using Bit Permutation in Wireless Sensor Network for Data Security." Journal of Computational and Theoretical Nanoscience 17, no. 11 (2020): 5037–45. http://dx.doi.org/10.1166/jctn.2020.9338.
Full textTomecek, Jozef. "Hardware optimizations of stream cipher rabbit." Tatra Mountains Mathematical Publications 50, no. 1 (2011): 87–101. http://dx.doi.org/10.2478/v10127-011-0039-8.
Full textGong, Xue, Xin Zhang, Qianmei Wu, et al. "Practical Opcode-based Fault Attack on AES-NI." IACR Transactions on Cryptographic Hardware and Embedded Systems 2025, no. 3 (2025): 693–716. https://doi.org/10.46586/tches.v2025.i3.693-716.
Full textBansod, Gaurav, Narayan Pisharoty, and Abhijit Patil. "PICO : An Ultra Lightweight and Low Power Encryption Design for Ubiquitous Computing." Defence Science Journal 66, no. 3 (2016): 259. http://dx.doi.org/10.14429/dsj.66.9276.
Full textRamachandra, Bharathi, and Peter Smitha Elsa. "Secured authentication of radio-frequency identification system using PRESENT block cipher." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (2023): 5462–71. https://doi.org/10.11591/ijece.v13i5.pp5462-5471.
Full textAhmed, Fatma, and Dalia H. Elkamchouchi. "A New Modified MARS Cryptosystem Based on Niho Exponent with an Enhanced S-Box Generation." Electronics 11, no. 15 (2022): 2318. http://dx.doi.org/10.3390/electronics11152318.
Full textEum, Siwoo, Minho Song, Sangwon Kim, and Hwajeong Seo. "Efficient GPU Parallel Implementation and Optimization of ARIA for Counter and Exhaustive Key-Search Modes." Electronics 14, no. 10 (2025): 2021. https://doi.org/10.3390/electronics14102021.
Full textM., Siva Kumar, and Sanjeeva Rayudu T.C. "An Efficient VLSI Implementation of the SMS4 Cipher Using a Twisted BDD S-Box Architecture." Advancement and Research in Instrumentation Engineering 8, no. 1 (2025): 33–40. https://doi.org/10.5281/zenodo.15228942.
Full textRamachandra, Bharathi, and Smitha Elsa Peter. "Secured authentication of radio-frequency identification system using PRESENT block cipher." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (2023): 5462. http://dx.doi.org/10.11591/ijece.v13i5.pp5462-5471.
Full textJiao, Lin, Yongqiang Li, and Yonglin Hao. "A Guess-And-Determine Attack On SNOW-V Stream Cipher." Computer Journal 63, no. 12 (2020): 1789–812. http://dx.doi.org/10.1093/comjnl/bxaa003.
Full textYousif, Intisar Abid. "Proposed A Permutation and Substitution Methods of Serpent Block Cipher." Ibn AL- Haitham Journal For Pure and Applied Science 32, no. 2 (2019): 131. http://dx.doi.org/10.30526/32.2.2120.
Full textSeok, Byoungjin, and Changhoon Lee. "Fast implementations of ARX-based lightweight block ciphers (SPARX, CHAM) on 32-bit processor." International Journal of Distributed Sensor Networks 15, no. 9 (2019): 155014771987418. http://dx.doi.org/10.1177/1550147719874180.
Full textMuhammad Erwanto, Sandi Fajar Rodiansyah, and Yudha Pradita Putra. "PENGAMANAN FILE DIGITAL MENGGUNAKAN METODE ALGORITMA KRIPTOGRAFI RIJNDAEL." Journal of Computation Science and Artificial Intelligence (JCSAI) 2, no. 1 (2025): 1–6. https://doi.org/10.58468/aabjbs17.
Full textN, Bharatesh, and Rohith S. "FPGA Implementation of Park-Miller Algorithm to Generate Sequence of 32-Bit Pseudo Random Key for Encryption and Decryption of Plain Text." International Journal of Reconfigurable and Embedded Systems (IJRES) 2, no. 3 (2013): 99. http://dx.doi.org/10.11591/ijres.v2.i3.pp99-105.
Full textM, Santhanalakshmi, Ms Lakshana K, and Ms Shahitya G M. "Enhanced AES-256 cipher round algorithm for IoT applications." Scientific Temper 14, no. 01 (2023): 184–90. http://dx.doi.org/10.58414/scientifictemper.2023.14.1.22.
Full textAn, Chunyan, Wei Bai, and Donglei Zhang. "Meet-in-the-middle differential fault analysis on Midori." Electronic Research Archive 31, no. 11 (2023): 6820–32. http://dx.doi.org/10.3934/era.2023344.
Full textWade, Sahil. "Description of Image encryption Using AES-256 bits." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 7167–71. http://dx.doi.org/10.22214/ijraset.2023.53365.
Full textKwon, Hyeokdong, SangWoo An, YoungBeom Kim, et al. "Designing a CHAM Block Cipher on Low-End Microcontrollers for Internet of Things." Electronics 9, no. 9 (2020): 1548. http://dx.doi.org/10.3390/electronics9091548.
Full textIbrahim, Nahla, and Johnson Agbinya. "Design of a Lightweight Cryptographic Scheme for Resource-Constrained Internet of Things Devices." Applied Sciences 13, no. 7 (2023): 4398. http://dx.doi.org/10.3390/app13074398.
Full textAlmukhlifi, Reham, and Poorvi L. Vora. "Linear Cryptanalysis of Reduced-Round Simeck Using Super Rounds." Cryptography 7, no. 1 (2023): 8. http://dx.doi.org/10.3390/cryptography7010008.
Full textShajarin, S., P. Leelavathi, B. Reddaiah, G. Amrutha Vani, and C. Swetha. "Three Fish Algorithm: T-Mix Cipher using SHA-256." International Journal of Innovative Technology and Exploring Engineering 11, no. 10 (2022): 5–11. http://dx.doi.org/10.35940/ijitee.j9267.09111022.
Full textS., Shajarin, Leelavathi P., Reddaiah B., Amrutha Vani G., and Swetha C. "Three Fish Algorithm: T-Mix Cipher using SHA-256." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 11, no. 10 (2022): 5–11. https://doi.org/10.5281/zenodo.8082529.
Full textShi, Jiali, Guoqiang Liu, and Chao Li. "SAT-Based Security Evaluation for WARP against Linear Cryptanalysis." IET Information Security 2023 (December 6, 2023): 1–14. http://dx.doi.org/10.1049/2023/5323380.
Full textShivangi, Wadehra, Goel Shivam, and Sengar Nidhi. "AES Algorithm Encryption and Decryption." International Journal of Trend in Scientific Research and Development 2, no. 3 (2019): 1075–77. https://doi.org/10.31142/ijtsrd11221.
Full text