Suchergebnisse - "AES Algorithm"
-
1
Autoren:
Quelle: Iraqi Journal for Computers and Informatics, Vol 51, Iss 1, Pp 94-107 (2025)
Schlagwörter: Technology, information security, aes algorithm, present algorithm, lea algorithm, chaotic system
-
2
Autoren: et al.
Quelle: Discover Applied Sciences, Vol 7, Iss 8, Pp 1-26 (2025)
Schlagwörter: Cross mapping algorithm, Data fusion, Compressed sensing, Sensitive data, AES algorithm, Encryption method, Science (General), Q1-390
Dateibeschreibung: electronic resource
Relation: https://doaj.org/toc/3004-9261
-
3
Autoren:
Quelle: Barekeng, Vol 18, Iss 4, Pp 2329-2344 (2024)
-
4
Autoren:
Quelle: Discover Electronics, Vol 2, Iss 1, Pp 1-17 (2025)
Schlagwörter: Data encryption, Blowfish, AES algorithm, Hybrid encryption, Security enhancement, Privacy resilience, Electrical engineering. Electronics. Nuclear engineering, TK1-9971, Mathematics, QA1-939
Dateibeschreibung: electronic resource
Relation: https://doaj.org/toc/2948-1600
-
5
Autoren:
Quelle: Scientific Reports, Vol 15, Iss 1, Pp 1-16 (2025)
Schlagwörter: Fog computing, ECC algorithm, AES algorithm, Adaptive encryption, Machine learning, Medicine, Science
Dateibeschreibung: electronic resource
Relation: https://doaj.org/toc/2045-2322
-
6
Autoren:
Quelle: Results in Engineering, Vol 27, Iss , Pp 106567- (2025)
Schlagwörter: ASIC Implementation, AES algorithm, Cadence, Internet of Things (IoT), Lightweight cryptography, Physical design, Technology
Dateibeschreibung: electronic resource
-
7
Autoren: et al.
Quelle: IEEE Access, Vol 12, Pp 90853-90861 (2024)
-
8
Autoren:
Quelle: International Journal of Cognitive Computing in Engineering, Vol 5, Iss, Pp 44-57 (2024)
-
9
Autoren:
Quelle: Jurnal Impresi Indonesia; Vol. 4 No. 1 (2025): Indonesian Impression Journal (JII); 996-1002 ; 2810-062X ; 2828-1284 ; 10.58344/jii.v4i1
Schlagwörter: Early detection of ransomware, cryptography for data security, AES algorithm on the cloud, cloud computing security, Ransomware Attack Mitigation
Geographisches Schlagwort: National
Dateibeschreibung: application/pdf
Relation: https://jii.rivierapublishing.id/index.php/jii/article/view/6188/848; https://jii.rivierapublishing.id/index.php/jii/article/view/6188/849; https://jii.rivierapublishing.id/index.php/jii/article/view/6188
-
10
Autoren:
Quelle: Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 6, Pp 3878-3885 (2022)
Schlagwörter: Electronic computers. Computer science, 0202 electrical engineering, electronic engineering, information engineering, Voice encryption, QA75.5-76.95, 02 engineering and technology, Lightweight AES algorithm, Mix column and FPGA, AES algorithm
-
11
Autoren:
Quelle: Journal of Engineering and Sustainable Development, Vol 25, Iss 4, Pp 58-66 (2021)
Journal of Engineering and Sustainable Development, Vol 25, Iss 4 (2021)Schlagwörter: aes algorithm, oaep, Scrypt, security, hybrid algorithm, Engineering (General). Civil engineering (General), rsa algorithm, OAEP, Hybrid algorithm, Security, RSA algorithm, scrypt, TA1-2040, AES algorithm
-
12
Autoren: et al.
Quelle: Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 10, Pp 9844-9851 (2022)
Schlagwörter: Countermeasures, Information Security, Electronic computers. Computer science, Hardware implementation, Fault Attacks, 0202 electrical engineering, electronic engineering, information engineering, QA75.5-76.95, 02 engineering and technology, AES algorithm, FPGA (Field Programmable Gate Arrays)
-
13
Autoren:
Quelle: مجلة جامعة دمشق للعلوم الهندسية; مجلد 40 عدد 1 (2024): مجلة جامعة دمشق للعلوم الهندسية ; Damascus University Journal for engineering sciences; Vol. 40 No. 1 (2024): Damascus University Journal for engineering sciences ; 2789-6854 ; 1999-7302
Schlagwörter: خوارزميّة AES, خوارزميّة BMC-AES, تحويل خلط الأعمدة, تحويل خلط الأعمدة العكسي, تحويل خلط الأعمدة الثنائي, رقم الفرع, طريقة التشفير Adiantum, أندرويد, نُظُم تشفير التخزين, AES algorithm, BMC-AES algorithm, MixColumns transformation, InvMixColumns transformation, BinMixcolumns transformation, branch number, Adiantum encryption method, Android, storage encryption systems
Dateibeschreibung: application/pdf
-
14
Autoren:
Quelle: Global Journal of Engineering and Technology Advances. 12:117-122
Schlagwörter: DES, AES algorithm, Encryption, Decryption, Key, Cipher text, Plaintext
-
15
Autoren: et al.
Quelle: Edu Komputika Journal, Vol 9, Iss 1, Pp 60-67 (2023)
-
16
Autoren:
Quelle: Internet of Things and Artificial Intelligence Journal; Vol. 2 No. 1 (2022): Volume 2 Issue 1, 2022 [February]; 1-9
Schlagwörter: El-Gamal Algorithm, Security, Cryptography, Email Security, AES Algorithm
Dateibeschreibung: application/pdf
-
17
Autoren: et al.
Quelle: IEEE Access, Vol 10, Pp 132908-132916 (2022)
Schlagwörter: Encryption, 02 engineering and technology, Biochemistry, Quantum mechanics, Gene, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Artificial Intelligence, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Entropy (arrow of time), Cipher, Block cipher, fractional transformation, Cryptography and Error-Correcting Codes, Chaos-based Image Encryption Techniques, Symmetric-key algorithm, Physics, block cipher, Differential Cryptanalysis, image encryption, Public-key cryptography, Computer science, TK1-9971, Algorithm, substitution box, Chemistry, Operating system, Computer Science, Physical Sciences, Cryptography, Transformation (genetics), Electrical engineering. Electronics. Nuclear engineering, Computer Vision and Pattern Recognition, AES algorithm, S-box, Mathematics
-
18
Autoren: et al.
Quelle: IEEE Access, Vol 10, Pp 119244-119258 (2022)
Schlagwörter: Image Encryption, Encryption, 02 engineering and technology, polynomial mapping, Substitution boxes, Cryptanalysis, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Artificial Intelligence, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Block Ciphers, Block cipher, Cryptography and Error-Correcting Codes, Chaos-based Image Encryption Techniques, Finite field, Discrete mathematics, Computer science, TK1-9971, Algorithm, Operating system, Color Image Encryption, block ciphers, Computer Science, Physical Sciences, Cryptography, Electrical engineering. Electronics. Nuclear engineering, Computer Vision and Pattern Recognition, AES algorithm, S-box, Mathematics
-
19
Autoren:
Quelle: Indonesian Journal of Electrical Engineering and Computer Science; Vol 36, No 1: October 2024; 290-301 ; 2502-4760 ; 2502-4752 ; 10.11591/ijeecs.v36.i1
Schlagwörter: Computer science, AES algorithm, Cryptography, ESP32, IoT security, Substitution-box
Dateibeschreibung: application/pdf
Relation: https://ijeecs.iaescore.com/index.php/IJEECS/article/view/36386/18634; https://ijeecs.iaescore.com/index.php/IJEECS/article/view/36386
-
20
Autoren: Saripa, Saripa
Quelle: Progressive Information, Security, Computer, and Embedded System; Vol. 2 No. 1 (2024): Vol. 2, No. 1 Maret (2024); 35-45 ; Progressive Information, Security, Computer, and Embedded System; Vol 2 No 1 (2024): Vol. 2, No. 1 Maret (2024); 35-45 ; 2986-7258 ; 2986-724X ; 10.61255/pisces.v2i1
Schlagwörter: Keamanan data, Algoritma AES, Implementasi, Keamanan File, Data Security, AES Algorithm, Implementation, File Security
Dateibeschreibung: application/pdf
Relation: https://journal.diginus.id/PISCES/article/view/100/141; https://journal.diginus.id/PISCES/article/view/100
Verfügbarkeit: https://journal.diginus.id/PISCES/article/view/100
Nájsť tento článok vo Web of Science
Full Text Finder