SDA Plus: Improving the Performance of the System Determine Algorithm (SDA) of the Switching Between AES-128 and AES-256 (MOLAZ Method)

UW Abboud, ML Shuwandy - 2023 IEEE 13th International …, 2023 - ieeexplore.ieee.org
There are many encryption algorithms; some of them are strong but slow in decryption,
unlike other methods. The MOLAZ method is one of the encryption techniques in UUM's …

[PDF][PDF] Optimizing Attendance Data Security by Implementing Dynamic AES-128 Encryption

M Nuzula, Y Away, K Kahlil… - Sinkron: jurnal dan …, 2024 - jurnal.polgan.ac.id
The protection of data security is crucial, particularly when dealing with the transmission of
sensitive information through communication networks. This article explores the Advanced …

[PDF][PDF] High-efficiency encryption and authentication network security for automotive Ethernet

JM Li, YJW Shuo-Fu, YN Xu - International Journal of Modeling and …, 2022 - ijmo.org
Automotive ethernet has the advantages of high bandwidth, low latency, and strong
compatibility, which meets the needs of new energy vehicles for the development of network …

[HTML][HTML] Seguridad y componentes nativos en una aplicación híbrida

D Rivero Albarrán… - Revista Científica …, 2023 - scielo.senescyt.gob.ec
El uso de dispositivos inteligentes es cada día mayor, y, por tanto, el desarrollo de
aplicaciones móviles se ha incrementado. Las empresas, conocedoras de esta realidad …

[PDF][PDF] Generation Initial Key of the AES Algorithm based on Randomized and Chaotic System

RM Al-Amri, DN Hamood, AK Farhan - Al-Salam Journal for Engineering and …, 2023 - iasj.net
Information security is a critical concern and a top priority for many communications
networks. Cryptography is a suitable method of data security that can be used to maintain …

Design and Implementation of Advanced Encryption Standard by New Substitution Box in Galois Field (𝟐𝟖)

W Alsobky, A Ismail, A Mohra, A Hassan… - International Journal …, 2022 - journals.ekb.eg
An inverse multiplexing method for irreducible polynomials is presented in this paper based
on the theory of substitution boxes. The method is based on the theory of substitution boxes …

Implementation Cryptography and Access Control on IoT-Based Warehouse Inventory Management System

M Yusuf, A Arizal, IR Hikmah - MATRIK: Jurnal …, 2022 - journal.universitasbumigora.ac.id
Warehousing is a product storage management activity to ensure product availability, so
inventory management is needed to oversee the movement of logistics and equipment …

Encryption and real time decryption for protecting machine learning models in android applications

A Verma - arXiv preprint arXiv:2109.02270, 2021 - arxiv.org
With the Increasing use of Machine Learning in Android applications, more research and
efforts are being put into developing better-performing machine learning algorithms with a …

Talk to Kotaro: a web crowdsourcing study on the impact of phone and prosody choice for synthesized speech on human impression

AGC Gonzalez, WS Lo… - 2022 31st IEEE …, 2022 - ieeexplore.ieee.org
During the COVID-19 pandemic, many research areas that require in person experiments
with human volunteers have been impacted due to lockdowns and other activity-restricting …

On-the-fly key generation based VLSI implementation of advanced encryption standard

S Valasa, S Avunoori, JR Shinde - 2021 6th International …, 2021 - ieeexplore.ieee.org
Data transmitted in a digital format is vulnerable to breaches. Here, the FPGA-based
Advanced Encryption Standard (AES) architecture is proposed to safeguard high speed …