Search

Showing total 2,915 results

Search Constraints

Start Over You searched for: Topic advanced encryption standard Remove constraint Topic: advanced encryption standard
2,915 results

Search Results

151. An equivalent condition on the switching construction of differentially 4-uniform permutations on from the inverse function.

152. Interoperable conditional access with video selective encryption for portable devices.

153. Implementation of Encryption Algorithm for Data Security in Cloud Computing.

154. Formal Approach for Verifying Galois Field Arithmetic Circuits of Higher Degrees.

156. A method for fault recognition in the last three rounds of Advanced Encryption Standard.

157. A unified improvement of the AES algorithm.

158. An Image Encryption Algorithm Based on Discrete-Time Alternating Quantum Walk and Advanced Encryption Standard.

159. CP-BDHCA: Blockchain-Based Confidentiality-Privacy Preserving Big Data Scheme for Healthcare Clouds and Applications.

160. Design on Face Recognition System with Privacy Preservation Based on Homomorphic Encryption.

161. An Advanced Encryption Standard in Memory (AESIM) Efficient, High Performance S-box Based AES Encryption and Decryption Architecture on VLSI.

162. k-Order Fibonacci Polynomials on AES-Like Cryptology.

163. Design, integration and implementation of crypto cores in an SoC environment.

164. Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home.

165. Enhancing Time-Frequency Analysis with Zero-Mean Preprocessing.

166. Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms.

167. Data Legal Supervision of Online Car-Hailing Platform Based on Big Data Technology and Edge Computing.

168. Efficient Key Management System Based Lightweight Devices in IoT.

169. Bio-Key Based AES for Personalized Image Cryptography.

170. Dynamic key dependent AES S-box generation with optimized quality analysis.

171. MGR Hash Functions.

172. Autotuning of Integrated Inductive Voltage Regulator Using On-Chip Delay Sensor to Tolerate Process and Passive Variations.

173. Reliable S-Box Hardware Implementation by Gate-Level Fault Masking Enhancement.

174. Reducing the Required Time and Power for Data Encryption and Decryption Using K-NN Machine Learning.

175. A dynamic approach for a lightweight and secure cipher for medical images.

176. A new high capacity and secure image realization steganography based on ASCII code matching.

177. Implementation of a High-Speed and High-Throughput Advanced Encryption Standard.

178. Real-time video security system using chaos- improved advanced encryption standard (IAES).

179. A Secure and Efficient Cluster-Based Authentication Scheme for Internet of Things (IoTs).

180. Secure Health Monitoring Communication Systems Based on IoT and Cloud Computing for Medical Emergency Applications.

181. Design of True Random Number Generator Using Fingerprint as an Entropy Source and Its Implementation in S-Box.

182. A SYMMETRIC CIPHER FOR WEST AFRICA: BASSAM SYMMETRIC BLOCK CIPHER (BSBC.

183. Novel secret key generation techniques using memristor devices.

184. On the choice of the appropriate AES data encryption method for ZigBee nodes.

185. Design of a Scan Chain for Side Channel Attacks on AES Cryptosystem for Improved Security.

186. Design of a BIST implemented AES crypto-processor ASIC.

187. Hybrid semantic deep learning architecture and optimal advanced encryption standard key management scheme for secure cloud storage and intrusion detection.

188. An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment.

189. Performance analysis of AES encryption operation modes for IoT devices.

190. PSP CO: An Efficient Hardware Architecture for AES Algorithm for High Throughput.

191. Research on Plaintext Restoration of AES Based on Neural Network.

192. RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys.

193. A 286 F2/Cell Distributed Bulk-Current Sensor and Secure Flush Code Eraser Against Laser Fault Injection Attack on Cryptographic Processor.

194. Design and Evaluation of a Spintronic In-Memory Processing Platform for Nonvolatile Data Encryption.

195. Secure Double Rate Registers as an RTL Countermeasure Against Power Analysis Attacks.

196. Enhancement of Cloud Security and removal of anti-patterns using multilevel encryption algorithms.

197. Lightweight 8‐bit S‐box and combined S‐box/S‐box−1 for cryptographic applications.

198. Design and implementation of a secured SDN system based on hybrid encrypted algorithms.

199. A novel NMF-based authentication scheme for encrypted speech in cloud computing.

200. Efficient and Secured Swarm Pattern Multi-UAV Communication.