Results 21 to 30 of about 668,009 (390)

A modified Matrices Approach in Advanced Encryption Standard Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2019
The cryptographic algorithms became the main proceeding for protection of very important data from unauthorized access. There are several cryptographic algorithms to ensure the data, but algorithms must be selected according to speed, strength and the ...
Abdul Monem Rahma, Atheer Abbas
doaj   +1 more source

Efficient and Lightweight In-memory Computing Architecture for Hardware Security [PDF]

open access: yesJournal of Parallel and Distributed Computing 2024, 2022
The paper proposes in-memory computing (IMC) solution for the design and implementation of the Advanced Encryption Standard (AES) based cryptographic algorithm. This research aims at increasing the cyber security of autonomous driverless cars or robotic autonomous vehicles.
arxiv   +1 more source

Reducing the Cost of Implementing AES as a Quantum Circuit

open access: yesIEEE Transactions on Quantum Engineering, 2020
To quantify security levels in a postquantum scenario, it is common to use the quantum resources needed to attack the Advanced Encryption Standard (AES) as a reference value.
Brandon Langenberg   +2 more
semanticscholar   +1 more source

Type-3 Feistel Network of The 128-bits Block Size Improved Blowfish Cryptographic Encryption [PDF]

open access: yesEngineering and Technology Journal, 2009
In this paper, a new secret-key block cipher called 128-bits Blowfish isproposed which is an evolutionary improvement of 64-bits Blowfish designed tomeet the requirements of the Advanced Encryption Standard (AES) to increasesecurity and to improve ...
Ashwaq T. Hashim
doaj   +1 more source

Implementing AES Encryption on Programmable Switches via Scrambled Lookup Tables

open access: yesSPIN@SIGCOMM, 2020
AES is a symmetric encryption algorithm widely used in many applications. An AES implementation in the data plane can help us build in-network security and privacy applications, such as IP header encryption or onion routing.
Xiaoqi Chen
semanticscholar   +1 more source

Stacking battery energy storage revenues with enhanced service provision

open access: yesIET Smart Grid, 2019
Battery energy storage systems (BESSs) offer many desirable services from peak demand lopping/valley filling too fast power response services. These services can be scheduled so they enhance each other; in this manner, the inverter size is effectively ...
Paul Vincent Brogan   +4 more
doaj   +1 more source

The Hybrid Cryptographic Algorithms for Secure RFID Data Protection in The Internet of Things

open access: yesJurnal ELTIKOM: Jurnal Teknik Elektro, Teknologi Informasi dan Komputer, 2023
RFID is often used by companies to identify employees and company assets, as well as in supermarkets to identify goods when shopping. In this increasingly sophisticated era, IoT technology has wide applications. The use of RFID technology in IoT networks
Alief Vickry Thaha Maulidzart   +4 more
doaj   +1 more source

O estado da arte das criptografias modernas: uma revisão sistemática da literatura

open access: yesRevista Brasileira de Computação Aplicada, 2020
Neste artigo realizamos uma análise sobre as principais características dos algoritmos criptográficos modernos, afim de obter o estado da arte das principais criptografias modernas.
Lara Ludwig   +2 more
doaj   +1 more source

An image encryption method based on chaos system and AES algorithm

open access: yesJournal of Supercomputing, 2019
In this paper, a novel image encryption algorithm is proposed based on the combination of the chaos sequence and the modified AES algorithm. In this method, the encryption key is generated by Arnold chaos sequence.
Alireza Arab, M. Rostami, B. Ghavami
semanticscholar   +1 more source

Digital Transformation of Energy Companies: A Colombian Case Study

open access: yesEnergies, 2021
The United Nations established 17 Sustainable Development Goals (SDGs), and the fulfillment of the 7th, defined as “Ensure access to affordable, reliable, sustainable, and modern energy for all”, requires energy industry transitions and digital ...
Sandra Giraldo   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy