نتایج جستجو برای: Advanced Encryption Standard
تعداد نتایج: 772288 فیلتر نتایج به سال:
This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and...
this paper mainly focused on implementation of aes encryption and decryption standard aes-128. all the transformations of both encryption and decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. this method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theaes inversesub bytes module and...
At present, security is significant for individuals and organizations. All information need to prevent theft, leakage, alteration. Security must be guaranteed by applying some or combining cryptography algorithms the information. Encipherment method that changes plaintext a secure form called cipherment. includes diverse types, such as symmetric asymmetric encipherment. This study proposes an i...
The Advanced Encryption Standard (AES), which implements the Rijndael cipher, is a symmetric block cipher that was developed as a result of a call by the United States National Institute of Standards and Technology in 1997 for a secure cryptosystem to replace the then standard Data Encryption Standard algorithm, which had become vulnerable to brute-force attacks. Among several proposals, the Ri...
The increase number of eavesdropping or cracker to attack the information and hack privacy people. So, essential issue is making system capable ciphering with rapid speed. Due advance in computer that made them analysis way speed way. development especially processer last decade create breaching any a matter time. Owing most ways are based on requireы be breached try brute force crack it. Howev...
The increased use of technology within the educational field gives rise to the need for developing valid instruments to measure key constructs associated with performance. We present some self-report instruments developed and/or validated in the Italian context that could be used to assess achievement emotions and correlates, within the theoretical framework of Pekrun’s control-value model. Fir...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید