DIKUL - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UL. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 1.167
1.
  • Substitution box generation... Substitution box generation using Chaos: An image encryption application
    Silva-García, V.M.; Flores-Carapia, R.; Rentería-Márquez, C. ... Applied mathematics and computation, 09/2018, Letnik: 332
    Journal Article
    Recenzirano
    Odprti dostop

    There are procedures to encrypt images; however, sometimes there is a loss of information in the decryption process or the key set size is not specifically mentioned. In this research, substitution ...
Celotno besedilo
Dostopno za: UL

PDF
2.
  • Differential Fault Analysis... Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault
    Tunstall, Michael; Mukhopadhyay, Debdeep; Ali, Subidh Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication
    Book Chapter, Conference Proceeding
    Recenzirano
    Odprti dostop

    In this paper we present a differential fault attack that can be applied to the AES using a single fault. We demonstrate that when a single random byte fault is induced at the input of the eighth ...
Celotno besedilo

PDF
3.
  • Analytical Study of Hybrid ... Analytical Study of Hybrid Techniques for Image Encryption and Decryption
    Chowdhary, Chiranji Lal; Patel, Pushpam Virenbhai; Kathrotia, Krupal Jaysukhbhai ... Sensors (Basel, Switzerland), 09/2020, Letnik: 20, Številka: 18
    Journal Article
    Recenzirano
    Odprti dostop

    The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the ...
Celotno besedilo
Dostopno za: UL

PDF
4.
  • Reducing the Cost of Implem... Reducing the Cost of Implementing the Advanced Encryption Standard as a Quantum Circuit
    Langenberg, Brandon; Pham, Hai; Steinwandt, Rainer IEEE transactions on quantum engineering, 2020, Letnik: 1
    Journal Article
    Recenzirano
    Odprti dostop

    To quantify security levels in a postquantum scenario, it is common to use the quantum resources needed to attack the Advanced Encryption Standard (AES) as a reference value. Specifically, in the ...
Celotno besedilo
Dostopno za: UL

PDF
5.
  • Image encryption using bloc... Image encryption using block cipher and chaotic sequences
    Artiles, José A.P.; Chaves, Daniel P.B.; Pimentel, Cecilio Signal processing. Image communication, November 2019, 2019-11-00, 20191101, Letnik: 79
    Journal Article
    Recenzirano

    Encryption of data with high correlation, such as images, is a challenge for block ciphers, since patterns of the original image may remain after encryption. This is due to the deterministic mapping ...
Celotno besedilo
Dostopno za: UL
6.
Celotno besedilo
7.
  • Optimization of Security Id... Optimization of Security Identification in Power Grid Data through Advanced Encryption Standard Algorithm
    Li, Biaoqi; Xu, Min; Zhou, Yuan ... Journal of Cyber Security and Mobility, 02/2024
    Journal Article
    Odprti dostop

    With the increasing reliance on digital technologies in power grid systems, ensuring the security and confidentiality of data has become paramount. This study focuses on optimizing security ...
Celotno besedilo
Dostopno za: UL
8.
  • A Modified Advanced Encrypt... A Modified Advanced Encryption Standard for Color Images
    Jassim, Sarah; Majeed, Sarab Iraqi journal of science, 01/2022
    Journal Article
    Odprti dostop

         The widespread use of images, especially color images and rapid advancement of computer science, have led to an emphasis on securing these images and defending them against intruders. One of the ...
Celotno besedilo
Dostopno za: UL

PDF
9.
  • Efficient and Secured Swarm... Efficient and Secured Swarm Pattern Multi-UAV Communication
    Raja, Gunasekaran; Anbalagan, Sudha; Ganapathisubramaniyan, Aishwarya ... IEEE transactions on vehicular technology, 07/2021, Letnik: 70, Številka: 7
    Journal Article
    Recenzirano
    Odprti dostop

    Unmanned Aerial Vehicle (UAV) or drone, is an evolving technology in today's market with an enormous number of applications. Mini UAVs are developed in order to compensate the performance constraints ...
Celotno besedilo
Dostopno za: UL

PDF
10.
  • Improving Firebase BaaS Ser... Improving Firebase BaaS Service Security in Counseling Chat Applications: AES-256 and CBC Approach for End-to-End Encryption
    Nurhandhi, Mogar; Suhendar, Agus JISA (Jurnal Informatika dan Sains), 12/2023, Letnik: 6, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    The activities of using the internet and exchanging information and sending messages have used a lot of internet media, one of which is chat message media, but over time data and information security ...
Celotno besedilo
Dostopno za: UL
1 2 3 4 5
zadetkov: 1.167

Nalaganje filtrov