Advanced Encryption Standard (AES) Cryptography Application Design
Abstract
Keywords
Full Text:
PDFReferences
Abood, O. G., & Guirguis, S. K. (2018). A Survey on Cryptography Algorithms. International Journal of Scientific and Research Publications (IJSRP), 8(7), 495–516. https://doi.org/10.29322/ijsrp.8.7.2018.p7978
Aldossary, S., & Allen, W. (2016). Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions. International Journal of Advanced Computer Science and Applications, 7(4). https://doi.org/10.14569/ijacsa.2016.070464
Alenezi, M. N., Alabdulrazzaq, H., & Mohammad, N. Q. (2020). Symmetric encryption algorithms: Review and evaluation study. International Journal of Communication Networks and Information Security, 12(2), 256–272.
Allwine, A., & Sitorus, J. H. P. . (2019). KEAMANAN DATA DENGAN SKEMA MULTI-KEY HIERARCHICAL IDENTITY-BASED SIGNATURE. Jurnal Bisantara Informatika, 3(1), 17. https://doi.org/10.21131/jbi.v3i1.7
Bucerzan, D., & Cr, M. (2010). 1 Introduction Design of a Stream Cipher. V(4), 483–489.
Bujari, D., & Aribas, E. (2017). Comparative Analysis Of Block Cipher Modes Of Operation. International Advanced Researches & Engineering Congress, November 2017, 2–5. https://www.researchgate.net/publication/322294203_Comparative_Analysis_of_Block_Cipher_Modes_of_Operation
Ekert, Artur K; Huttner, Bruno; Palma, M. P. A. (1994). Eavesdropping-on-quantum-cryptographical-systems.pdf. Physical Review A, 50 (2), 1047–1056. https://doi.org/https://doi.org/10.1103/physreva
El Adib, S., & Raissouni, N. (2012). AES Encryption Algorithm Hardware Implementation: Throughput and Area Comparison of 128, 192 and 256-bits Key. International Journal of Reconfigurable and Embedded Systems (IJRES), 1(2). https://doi.org/10.11591/ijres.v1i2.551
Fouque, P., Jean, J., Peyrin, T., Fouque, P., Jean, J., Peyrin, T., & Evaluation, S. (2014). Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128 To cite this version : HAL Id : hal-01094302 Structural Evaluation of AES and Chosen-Key Distinguisher of.
Hutabarat, A., & Sawitri, R. (2024). Text Data Embedding into Images Using Chaotic Least Significant Bit Encod-ing Steganography. Jurnal Pepadun, 5(3), 286–298. https://doi.org/10.23960/pepadun.v5i3.246
Kawle, P., Hiwase, A., Bagde, G., Tekam, E., & Kalbande, R. (2014). Modified Advanced Encryption Standard. International Journal of Soft Computing and Engineering (IJSCE), 4(1), 21–23.
Parnas, D. L. (1969). On the use of transition diagrams in the design of a user interface for an interactive computer system. Proceedings of the 1969 24th National Conference, ACM 1969, 379–385. https://doi.org/10.1145/800195.805945
Rabah, K. (2005). Theory and Implementation of Data Encryption Standard: A Review. Information Technology Journal, 4(4), 307–325. https://doi.org/10.3923/itj.2005.307.325
Sarkar, P., & Noel, M. S. (2020). Cipher: Encryption & Decryption. International Research Journal of Engineering and Technology, 731–737. www.irjet.net
Stergiou, C., Psannis, K. E., Kim, B. G., & Gupta, B. (2018). Secure integration of IoT and Cloud Computing. Future Generation Computer Systems, 78(December), 964–975. https://doi.org/10.1016/j.future.2016.11.031
Vasanth, S., & Dhikhi, T. (2016). Secure data transmission using steganography and encryption techniques. International Journal of Pharmacy and Technology, 8(4), 21130–21139. https://doi.org/10.5121/ijcis.2012.2314
Wang, G., & Wayne, F. (2014). Embedded System Software Design With State Diagrams. International Journal of Embedded Systems Volume, 1, 28–34.
DOI: https://doi.org/10.30596/jcositte.v6i1.22746
Refbacks
- There are currently no refbacks.