-
1Academic Journal
المؤلفون: Marjuni, Aris, Rijati, Nova, Susanto, Ajib, Sinaga, Daurat, Purwanto, Purwanto, Hasibuan, Zainal Arifin, Yaacob, Noorayisahbe Mohd.
المصدر: Bulletin of Electrical Engineering and Informatics; Vol 13, No 6: December 2024; 4488-1497 ; 2302-9285 ; 2089-3191 ; 10.11591/eei.v13i6
مصطلحات موضوعية: Informatics engineering, data hiding, Advanced encryption standard, Data security, Embedded information, Genetic algorithm, Key expansion, Least significant bit
وصف الملف: application/pdf
-
2Academic Journal
المؤلفون: Temel, Mehmet Hüseyin, Škorić, Boris
المصدر: Temel , M H & Škorić , B 2024 , ' Entropically secure encryption with faster key expansion ' , Quantum Information Processing , vol. 23 , no. 4 , 119 . https://doi.org/10.1007/s11128-024-04330-z
مصطلحات موضوعية: Entropic security, Approximate quantum encryption, Key expansion, One-time pad
وصف الملف: application/pdf
الاتاحة: https://research.tue.nl/en/publications/6bc60410-0a05-4987-9426-c69f4ceaf095
https://doi.org/10.1007/s11128-024-04330-z
https://pure.tue.nl/ws/files/322277574/s11128-024-04330-z.pdf
https://link.springer.com/article/10.1007/s11128-024-04330-z
http://www.scopus.com/inward/record.url?scp=85188455036&partnerID=8YFLogxK -
3Academic Journal
المؤلفون: Lu, Jinyu, Liu, Yunwen, Ashur, Tomer, Li, Chao
المصدر: Lu , J , Liu , Y , Ashur , T & Li , C 2022 , ' On the Effect of the Key Expansion Algorithm in Simon-like Ciphers ' , The Computer Journal , vol. 65 , no. 9 , pp. 2454-2469 . https://doi.org/10.1093/comjnl/bxab082
مصطلحات موضوعية: RX-cryptanalysis, Simeck, Simon, Key Schedule, Key Expansion Algorithm, rotational-XOR cryptanalysis, key-expansion algorithm
وصف الملف: application/pdf
-
4Academic Journal
المؤلفون: Muhammed J. Al-Muhammed, Raed Abu Zitar
المصدر: Symmetry, Vol 14, Iss 218, p 218 (2022)
مصطلحات موضوعية: chaotic key expansion, encryption technique, key expansion, key round, key-echo code generation, Mathematics, QA1-939
Relation: https://www.mdpi.com/2073-8994/14/2/218; https://doaj.org/toc/2073-8994; https://doaj.org/article/460ad79e123c43cf8bc2367e57c4a6a3
-
5Academic Journal
المؤلفون: Mr.Sailesh S, Dr.Archana HR, Dr.Surendra H H, Dr.Madhusudhan K N
مصطلحات موضوعية: AES, Encryption, Decryption, Masking, Round operation, Key expansion
Relation: https://doi.org/10.5281/zenodo.7240502; https://doi.org/10.5281/zenodo.7240503; oai:zenodo.org:7240503
-
6Academic Journal
المؤلفون: Ahmad A. Al-Daraiseh, Muhammed J. Al-Muhammed
المصدر: Symmetry; Volume 14; Issue 11; Pages: 2372
مصطلحات موضوعية: encryption method, mobile-point substitution method, key echo generation, key expansion
وصف الملف: application/pdf
Relation: Computer Science and Symmetry/Asymmetry; https://dx.doi.org/10.3390/sym14112372
الاتاحة: https://doi.org/10.3390/sym14112372
-
7Academic Journal
المؤلفون: Thanikodi Manoj Kumar, Kavitha Rani Balmuri, Adam Marchewka, Parameshachari Bidare Divakarachari, Srinivas Konda
المصدر: Sensors; Volume 21; Issue 24; Pages: 8347
مصطلحات موضوعية: advanced encryption standard, data security, field programmable gate arrays, fork–join model of key expansion, hardware resources, propagation delay
وصف الملف: application/pdf
Relation: Sensor Networks; https://dx.doi.org/10.3390/s21248347
الاتاحة: https://doi.org/10.3390/s21248347
-
8
-
9
المؤلفون: Chao Li, Jinyu Lu, Tomer Ashur, Yunwen Liu
المساهمون: Coding Theory and Cryptology
المصدر: The Computer Journal, 65(9), 2454-2469. Oxford University Press
مصطلحات موضوعية: Technology, Theoretical computer science, General Computer Science, Computer science, 0102 computer and information sciences, 02 engineering and technology, Simeck, 01 natural sciences, Computer Science, Theory & Methods, key-expansion algorithm, 0202 electrical engineering, electronic engineering, information engineering, Key Expansion Algorithm, Computer Science, Hardware & Architecture, Simon, Key Schedule, Science & Technology, Computer Science, Information Systems, RX-cryptanalysis, 020206 networking & telecommunications, Computer Science, Software Engineering, rotational-XOR cryptanalysis, CRYPTANALYSIS, 010201 computation theory & mathematics, Computer Science, Key (cryptography), BLOCK
وصف الملف: application/pdf
-
10Academic Journal
المؤلفون: Budiman, Arif, Paradise, Paradise
المصدر: Compiler; Vol 8, No 2 (2019): November; 149-156 ; 2549-2403 ; 2252-3839 ; 10.28989/compiler.v8i2
مصطلحات موضوعية: kriptografi, Vigenere Cipher, RC6, RC6 key expansion, One time pad
وصف الملف: application/pdf
Relation: https://ejournals.itda.ac.id/index.php/compiler/article/view/481/pdf; https://ejournals.itda.ac.id/index.php/compiler/article/view/481
-
11Academic Journal
المؤلفون: Reddy, P Penchala1, Thrimurthulu, V.2, Kumar, K. Jagadeesh3
المصدر: International Journal of Engineering Research 3(12):780-785. 2014
-
12Conference
المؤلفون: Le Bouder, Hélène, Lashermes, Ronan, Linge, Yanis, Thomas, Gaël, Zie, Jean-Yves
المساهمون: Threat Analysis and Mitigation for Information Security (TAMIS), Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-LANGAGE ET GÉNIE LOGICIEL (IRISA-D4), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS), STMicroelectronics Rousset (ST-ROUSSET), Orange Labs Issy les Moulineaux, France Télécom, DPACA Gardanne, CEA Tech en région Sud (DSUD), CEA Tech en régions (CEA-TECH-Reg), Direction de Recherche Technologique (CEA) (DRT (CEA)), Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Direction de Recherche Technologique (CEA) (DRT (CEA)), Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-CEA Tech en régions (CEA-TECH-Reg), Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Commissariat à l'énergie atomique et aux énergies alternatives (CEA)
المصدر: FPS 2016 ; https://inria.hal.science/hal-01405793 ; FPS 2016, Oct 2016, Québec, Canada
مصطلحات موضوعية: Side Channel Analysis, Hamming Weight, AES, Key Expansion, Multi-Round Attack, Bayesian Inference, Belief Propagation, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
جغرافية الموضوع: Québec
Time: Québec, Canada
-
13Conference
المصدر: Seminar Nasional Multi Disiplin Ilmu Unisbank 2016
مصطلحات موضوعية: Indonesia, key expansion, blowfis, kriptografi
وصف الملف: application/pdf
-
14
المؤلفون: Georgi Bebrov
المصدر: Quantum Information Processing. 21
مصطلحات موضوعية: quantum key distribution, Modeling and Simulation, Signal Processing, relativistic quantum key distribution, quantum key expansion, Statistical and Nonlinear Physics, Electrical and Electronic Engineering, Theoretical Computer Science, Electronic, Optical and Magnetic Materials
وصف الملف: text/plain; application/pdf
-
15Conference
المؤلفون: Kang, Ju-Sung, Kim, Nayoung, Ju, Wangho, Yi, Ok-Yeon
المساهمون: Kookmin University Seoul, David Naccache, Damien Sauveron, TC 11, WG 11.2
المصدر: Lecture Notes in Computer Science ; 8th IFIP International Workshop on Information Security Theory and Practice (WISTP) ; https://hal.inria.fr/hal-01400917 ; 8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.10-23, ⟨10.1007/978-3-662-43826-8_2⟩
مصطلحات موضوعية: Privacy, Authenticity, Key expansion function, Keying material, Provable security, Pseudorandomness, PRF, PRP, [INFO]Computer Science [cs]
Relation: hal-01400917; https://hal.inria.fr/hal-01400917; https://hal.inria.fr/hal-01400917/document; https://hal.inria.fr/hal-01400917/file/978-3-662-43826-8_2_Chapter.pdf
-
16Academic Journal
المؤلفون: Quynh Dang, John Bryson Secretary
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: Randomness Extraction, Key expansion, Pseudorandom Function (PRF, HMAC, ANS
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.233.3393; http://csrc.nist.gov/publications/nistpubs/800-135-rev1/sp800-135-rev1.pdf
-
17Academic Journal
المؤلفون: Quynh Dang
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: Randomness Extraction, Key expansion, Pseudorandom Function (PRF, HMAC, ANS
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.188.3565; http://csrc.nist.gov/publications/nistpubs/800-135/sp800-135.pdf
-
18Academic Journal
المؤلفون: Quynh Dang
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: KEY WORDS, Cryptographic key, shared secret, Diffie-Hellman (DH) key exchange, hash function, Key Derivation Function (KDF, Hash-based Key Derivation Function (HKDF, Randomness Extraction, Key Expansion, Pseudorandom Function (PRF
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.172.5775; http://csrc.ncsl.nist.gov/publications/drafts/800-135/draft-sp800-135.pdf
-
19Academic Journal
المصدر: School of Engineering and Technology Publications
مصطلحات موضوعية: Vehicular communications (V2X), implicit certificates, butterfly key expansion, security
-
20Academic Journal
المؤلفون: Naim Ajlouni, Asim El-sheikh, Abdullah Abdali Rashed
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: Rijndael block cipher, AES, key generation, key expansion