Results 1 to 10 of about 717,304 (368)

Images Encryption Method using Steganographic LSB Method, AES and RSA algorithm

open access: hybridNonlinear Engineering, 2017
Vulnerability of communication of digital images is an extremely important issue nowadays, particularly when the images are communicated through insecure channels.
Moumen Abdelkader, Sissaoui Hocine
doaj   +3 more sources

A Low Area High Speed FPGA Implementation of AES Architecture for Cryptography Application

open access: yesElectronics, 2021
Nowadays, a huge amount of digital data is frequently changed among different embedded devices over wireless communication technologies. Data security is considered an important parameter for avoiding information loss and preventing cyber-crimes.
T. Kumar   +4 more
semanticscholar   +1 more source

Digitalisation and Modernisation of Hydropower Operating Facilities to Support the Colombian Energy Mix Flexibility

open access: yesEnergies, 2023
Hydropower plants cover almost 70% of the Colombian electrical demand, were built several decades ago, and present low levels of digitisation compared to other modern power-generation technologies, e.g., wind turbines, solar PV plants, and recently buil ...
Aldemar Leguizamon-Perilla   +6 more
doaj   +1 more source

Band planting: a new restoration technique under the multi-criteria analysis of ecological functionality

open access: yesRevista Brasileira de Ciências Ambientais, 2022
We evaluated band planting (BP) to assess its efficiency in the early restoring of ecological processes using a multi-criteria protocol known as Framework for the Evaluation of Natural Resource Management Systems Incorporating Sustainability Indicators ...
Bruno Santos Francisco   +7 more
doaj   +1 more source

A Modification of TEA Block Cipher Algorithm for Data Security (MTEA) [PDF]

open access: yesEngineering and Technology Journal, 2011
This paper attempts to develop a simple, stronger and safer cryptographic algorithm which would not only be a secure one, but also reduces total time taken for encryption and decryption.
Gaidaa Saeed Mahdi
doaj   +1 more source

The Hybrid Cryptographic Algorithms for Secure RFID Data Protection in The Internet of Things

open access: yesJurnal ELTIKOM: Jurnal Teknik Elektro, Teknologi Informasi dan Komputer, 2023
RFID is often used by companies to identify employees and company assets, as well as in supermarkets to identify goods when shopping. In this increasingly sophisticated era, IoT technology has wide applications. The use of RFID technology in IoT networks
Alief Vickry Thaha Maulidzart   +4 more
doaj   +1 more source

Reducing the Cost of Implementing AES as a Quantum Circuit

open access: yesIEEE Transactions on Quantum Engineering, 2020
To quantify security levels in a postquantum scenario, it is common to use the quantum resources needed to attack the Advanced Encryption Standard (AES) as a reference value.
Brandon Langenberg   +2 more
semanticscholar   +1 more source

Implementing AES Encryption on Programmable Switches via Scrambled Lookup Tables

open access: yesSPIN@SIGCOMM, 2020
AES is a symmetric encryption algorithm widely used in many applications. An AES implementation in the data plane can help us build in-network security and privacy applications, such as IP header encryption or onion routing.
Xiaoqi Chen
semanticscholar   +1 more source

Design of Convolutional Neural Networks Architecture for Non-Profiled Side-Channel Attack Detection

open access: yesElektronika ir Elektrotechnika, 2023
Deep learning (DL) is a new option that has just been made available for side-channel analysis. DL approaches for profiled side-channel attacks (SCA) have dominated research till now.
Amjed Abbas Ahmed   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy