Results 11 to 20 of about 668,009 (390)

Quantum Security Analysis of AES

open access: yesIACR Transactions on Symmetric Cryptology, 2019
In this paper we analyze for the first time the post-quantum security of AES. AES is the most popular and widely used block cipher, established as the encryption standard by the NIST in 2001. We consider the secret key setting and, in particular, AES-256, the recommended primitive and one of the few existing ones that aims at providing a post-quantum ...
Bonnetain, Xavier   +2 more
openaire   +8 more sources

Analysing Relations involving small number of Monomials in AES S- Box [PDF]

open access: yesarXiv, 2017
In the present day, AES is one the most widely used and most secure Encryption Systems prevailing. So, naturally lots of research work is going on to mount a significant attack on AES.
Ghosal, Riddhi
core   +2 more sources

AE solutions and AE solvability to general interval linear systems [PDF]

open access: yesLinear Algebra and its Applications, 2015
We consider linear systems of equations and inequalities with coefficients varying inside given intervals. We define their solutions (so called AE solutions) and solvability (so called AE solvability) by using forall-exists quantification of interval parameters.
openaire   +4 more sources

A Low Area High Speed FPGA Implementation of AES Architecture for Cryptography Application

open access: yesElectronics, 2021
Nowadays, a huge amount of digital data is frequently changed among different embedded devices over wireless communication technologies. Data security is considered an important parameter for avoiding information loss and preventing cyber-crimes.
T. Kumar   +4 more
semanticscholar   +1 more source

Digitalisation and Modernisation of Hydropower Operating Facilities to Support the Colombian Energy Mix Flexibility

open access: yesEnergies, 2023
Hydropower plants cover almost 70% of the Colombian electrical demand, were built several decades ago, and present low levels of digitisation compared to other modern power-generation technologies, e.g., wind turbines, solar PV plants, and recently buil ...
Aldemar Leguizamon-Perilla   +6 more
doaj   +1 more source

Band planting: a new restoration technique under the multi-criteria analysis of ecological functionality

open access: yesRevista Brasileira de Ciências Ambientais, 2022
We evaluated band planting (BP) to assess its efficiency in the early restoring of ecological processes using a multi-criteria protocol known as Framework for the Evaluation of Natural Resource Management Systems Incorporating Sustainability Indicators ...
Bruno Santos Francisco   +7 more
doaj   +1 more source

The Effect of Text Summarization in Essay Scoring (Case Study: Teach on E-Learning)

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2022
The development of automated essay scoring (AES) in the neural network (NN) approach has eliminated feature engineering. However, feature engineering is still needed, moreover, data with labels in the form of rubric scores, which are complementary to AES
Sensa Gudya Sauma Syahra   +2 more
doaj   +1 more source

Comparison Of Biochemical Markers and Insulin Resistance of Polycystic Ovary Syndrome Patients Diagnosed with the Criteria of Rotterdam, Androgen Excess Society and National Institutes of Health

open access: yesHitit Medical Journal, 2023
Objective: There are different criteria to diagnose polycystic ovary syndrome (PCOS) such as Rotterdam Consensus, Androgen Excess Society (AES), and National Institutes of Health (NIH).
Ebru Celik   +4 more
doaj   +1 more source

Hybrid Cryptography with a One–Time Stamp to Secure Contact Tracing for COVID–19 Infection

open access: yesInternational Journal of Applied Mathematics and Computer Science, 2022
The COVID-19 pandemic changed the lives of millions of citizens worldwide in the manner they live and work to the so-called new norm in social standards.
El-Douh Ahmed Abdel-Rahim   +3 more
doaj   +1 more source

Design of Convolutional Neural Networks Architecture for Non-Profiled Side-Channel Attack Detection

open access: yesElektronika ir Elektrotechnika, 2023
Deep learning (DL) is a new option that has just been made available for side-channel analysis. DL approaches for profiled side-channel attacks (SCA) have dominated research till now.
Amjed Abbas Ahmed   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy