Search

Your search keyword '"ADVANCED Encryption Standard"' showing total 49 results

Search Constraints

Start Over You searched for: Descriptor "ADVANCED Encryption Standard" Remove constraint Descriptor: "ADVANCED Encryption Standard" Publisher wiley-blackwell Remove constraint Publisher: wiley-blackwell
49 results on '"ADVANCED Encryption Standard"'

Search Results

1. Cryptographic methods for secured communication in SDN‐based VANETs: A performance analysis.

2. Construction of secure adaptive frequency hopping sequence sets based on AES algorithm.

3. A cryptographic security framework for hybrid Cloud‐Internet of Things network.

4. Secured data offloading using reinforcement learning and Markov decision process in mobile edge computing.

5. Low area and high throughput implementation of advanced encryption standard hardware accelerator on FPGA using Mux‐Demux pair.

6. A turbo‐based encryption and coding scheme for multiple‐input multiple‐output orthogonal frequency division multiplexing wireless communication systems affected by Doppler frequency offset.

7. First end‐to‐end PQC protected DPU‐to‐DPU communications.

8. Methods for improving the implementation of advanced encryption standard hardware accelerator on field programmable gate array‐A survey.

9. Hardware obfuscation of AES IP core using combinational hardware Trojan circuit for secure data transmission in IoT applications.

10. Trustful data trading through monetizing IoT data using BlockChain based review system.

11. Low‐power and area‐efficient design of AES S‐Box using enhanced transformation method for security application.

12. Strengthened 32‐bit AES implementation: Architectural error correction configuration with a new voting scheme.

13. Lightweight 8‐bit S‐box and combined S‐box/S‐box−1 for cryptographic applications.

14. An image encryption algorithm with a plaintext‐related quantisation scheme.

15. A novel security mechanism using AES cryptography approach in cloud computing.

16. Area‐efficient and high‐speed hardware structure of hybrid cryptosystem (AES‐RC4) for maximizing key lifetime using parallel subpipeline architecture.

17. The enhancement of security measures in advanced encryption standard using double precision floating point multiplication model.

18. An efficient NoC router design by using an enhanced AES with retiming and clock gating techniques.

19. An observer‐based exponential synchronization scheme for chaotic systems: Using advanced encryption standard as auxiliary.

20. Enhanced security‐aware technique and ontology data access control in cloud computing.

21. RISC32‐E: Field programmable gate array based sensor node with queue system to support fast encryption in Industrial Internet of Things applications.

22. Cryptanalysis of a random number generator based on continuous‐time chaos.

23. Beyond algorithmic noise or how to shuffle parallel implementations?

24. Practical fault resilient hardware implementations of AES.

25. High throughput fault‐resilient AES architecture.

26. A method for fault recognition in the last three rounds of Advanced Encryption Standard.

27. Partitioned security processor architecture on FPGA platform.

28. Implementation flaws in the masking scheme of DPA Contest v4.

29. Secure data processing with massive-parallel SIMD matrix for embedded SoC in digital-convergence mobile devices.

30. Precise methods for distinguishing S‐box faults in laser injection attacks.

31. Practical parallel AES algorithms on cloud for massive users and their performance evaluation.

32. New Type of Collision Attack on First-Order Masked AESs.

33. Design of ultra‐low power AES encryption cores with silicon demonstration in SOTB CMOS process.

34. Design space extension for secure implementation of block ciphers.

35. Impossible differential cryptanalysis on cipher E2.

36. Performance of joint multilevel/AES-LDPCC-CPFSK schemes over wireless sensor networks.

37. Low‐delay AES polynomial basis multiplier.

38. Editorial for special section "CACS18: Modelling and control for practical systems".

39. Power‐aware hiding method for S‐box protection.

40. Precise methods for distinguishing S-box faults in laser injection attacks.

41. Security‐ and safety‐critical cyber‐physical systems.

42. Analysing encryption mechanisms and functional safety in a ROS‐based architecture.

43. Deep learning-assisted and combined attack: a novel side-channel attack.

44. Masked AES PUF: a new PUF against hybrid SCA/MLAs.

46. Implementation and optimization of a data protecting model on the Sunway TaihuLight supercomputer with heterogeneous many‐core processors.

47. SeC‐SDWSN: Secure cluster‐based SDWSN environment for QoS guaranteed routing in three‐tier architecture.

48. finding the key.

Catalog

Books, media, physical & digital resources