نتایج جستجو برای: Advanced Encryption Standard

تعداد نتایج: 772288  

This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and...

Journal: :journal of artificial intelligence in electrical engineering 2014
shahin shafei

this paper mainly focused on implementation of aes encryption and decryption standard aes-128. all the transformations of both encryption and decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. this method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theaes inversesub bytes module and...

Journal: :International Journal of Electrical and Computer Engineering 2023

At present, security is significant for individuals and organizations. All information need to prevent theft, leakage, alteration. Security must be guaranteed by applying some or combining cryptography algorithms the information. Encipherment method that changes plaintext a secure form called cipherment. includes diverse types, such as symmetric asymmetric encipherment. This study proposes an i...

2007
Brian Carter Ari Kassin Tanja Magoc

The Advanced Encryption Standard (AES), which implements the Rijndael cipher, is a symmetric block cipher that was developed as a result of a call by the United States National Institute of Standards and Technology in 1997 for a secure cryptosystem to replace the then standard Data Encryption Standard algorithm, which had become vulnerable to brute-force attacks. Among several proposals, the Ri...

Journal: :JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES 2020

Journal: :Eureka: Physics and Engineering 2021

The increase number of eavesdropping or cracker to attack the information and hack privacy people. So, essential issue is making system capable ciphering with rapid speed. Due advance in computer that made them analysis way speed way. development especially processer last decade create breaching any a matter time. Owing most ways are based on requireы be breached try brute force crack it. Howev...

Journal: :IxD&A 2014
Daniela Raccanello Margherita Brondino Margherita Pasini

The increased use of technology within the educational field gives rise to the need for developing valid instruments to measure key constructs associated with performance. We present some self-report instruments developed and/or validated in the Italian context that could be used to assess achievement emotions and correlates, within the theoretical framework of Pekrun’s control-value model. Fir...

Journal: :International Journal of Computer Applications 2016

Journal: :Turkish Journal of Computer and Mathematics Education (TURCOMAT) 2021

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید