Search

Showing total 2,895 results

Search Constraints

Start Over You searched for: Topic advanced encryption standard Remove constraint Topic: advanced encryption standard
2,895 results

Search Results

1. Evidence of a Larger EM-Induced Fault Model

3. Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection

4. Differential Fault Analysis of AES-128 Key Schedule Using a Single Multi-byte Fault

5. Intel’s New AES Instructions for Enhanced Performance and Security

6. Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent

7. Related-Key Differential Cryptanalysis of 192-bit Key AES Variants

9. INTELLIGENT AUTHENTICATION FOR IDENTITY AND ACCESS MANAGEMENT: A REVIEW PAPER

10. Implementation of a block cipher algorithm for medical information security on cloud environment: using modified advanced encryption standard approach.

11. Validating the DFA Attack Resistance of AES (Short Paper)

12. SMART HOME POWER MANAGEMENT BASED ON IOT.

13. A Review Paper on Comparative Study of FPGA Implemented AES, Rijndael AES and Pipelined AES Algorithms for Secure Adhoc Networks

14. Short paper: enhancing Wi-Fi security using a hybrid algorithm of blowfish and RC6

15. Advances in Cybersecurity and Reliability.

16. INTELLIGENT AUTHENTICATION FOR IDENTITY AND ACCESS MANAGEMENT: A REVIEW PAPER.

17. Enhanced Security in Supply Chain Management System Using AES and Md5 Algorithms.

18. Advanced Encryption Standard (AES) - An Update [Invited Paper]

19. Secure File Operations: Using Advanced Encryption Standard for Strong Data Protection.

20. Construction of secure adaptive frequency hopping sequence sets based on AES algorithm.

21. Low-power secure caching strategy for Internet of vehicles.

22. Secure Messaging Application Development: Based on Post-Quantum Algorithms CSIDH, Falcon, and AES Symmetric Key Cryptosystem.

23. A method to mitigate cyber exploits on automatic dependent surveillance-broadcast (ADS-B) data transmissions.

24. Multi-stage cryptography technique for wireless networks.

25. The Security Evaluation of an Efficient Lightweight AES Accelerator †.

26. Large file encryption in a Reduced-Round Permutation-Based AES file management system.

27. Design and implementation of a cryptographic algorithm based on the AES advanced encryption standard for UHF RFID systems.

28. E2EE enhanced patient-centric blockchain-based system for EHR management.

29. A secure and cost effective platform for employee management system using lightweight standalone framework over El Gamal encryption algorithm.

30. EESSMT: An Energy Efficient Hybrid Scheme for Securing Mobile Ad hoc Networks Using IoT.

31. Vulnerability Analysis of MEGA Encryption Mechanism.

32. Comparison of some parameters based on different key sizes for certain class of cryptographic algorithms.

33. An improved secure file deduplication avoidance using CKHO based deep learning model in a cloud environment.

34. End-to-end security enabled intelligent remote IoT monitoring system.

35. Enhance Speed Low Area FPGA Design Using S-Box GF and Pipeline Approach on Logic for AES.

36. PPSecS: Privacy-Preserving Secure Big Data Storage in a Cloud Environment.

37. AES-128 reduced-round permutation by replacing the MixColumns function.

38. An adaptive image encryption scheme guided by fuzzy models.

39. Optimization of AES-128 Encryption Algorithm for Security Layer in ZigBee Networking of Internet of Things.

40. Enhancing Security in ZigBee Wireless Sensor Networks: A New Approach and Mutual Authentication Scheme for D2D Communication.

41. Computer Forensics Framework for Efficient and Lawful Privacy-Preserved Investigation.

42. An Efficient Color-Image Encryption Method Using DNA Sequence and Chaos Cipher.

43. Split-n-Swap: A New Modification of the Twofish Block Cipher Algorithm.

44. Proposed Privacy Preservation Technique for Color Medical Images.

45. A REVIEW ON FPGA BASED DESIGN OF ADVANCED ENCRYPTION STANDARD (AES) CRYPTOGRAPHY SECURE ALGORITHM.

46. Editorial for special section "CACS18: Modelling and control for practical systems".

47. Screening the covert key using honey encryption to rule out the brute force attack of AES-a survey.

48. A Hybrid Security Scheme for Inter-vehicle Communication in Content Centric Vehicular Networks.

49. Implementation of VLSI on Signal Processing-Based Digital Architecture Using AES Algorithm.

50. Performance investigations on data protection algorithms in generalized multi protocol label switched optical networks.