Enhanced AES algorithm based on 14 rounds in securing data and minimizing processing time
Computer, Internet technology have grown exponentially, and constant evolution until today. The usage of digital data such as text, images, audio, animation and videos are commonly used in many aspects of daily activity. The continuous increase in the use of digital data transmission over a network...
| Main Authors: | Mohd Ariffin, Noor Afiza, Ahmed Ashawesh, Aymen Yousef |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IOP Publishing
2021
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/97085/ http://psasir.upm.edu.my/id/eprint/97085/1/ABSTRACT.pdf |
Similar Items
Securing cloud data system (SCDS) for key exposure using AES algorithm
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
Secure mobile AES encryptor (SMAE)
by: Satia, Anbalagan
Published: (2016)
by: Satia, Anbalagan
Published: (2016)
A Proposed Priority Dynamic Quantum Time Algorithm to Enhance Varying Time Quantum Round Robin Algorithm
by: Mohammed, Maysoon A., et al.
Published: (2016)
by: Mohammed, Maysoon A., et al.
Published: (2016)
Information Security Analysis and Solution using LSB Steganography and
AES Cryptographic Algorithm
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
Queueing Theory Study of Round Robin Versus Priority Dynamic Quantum Time Round Robin Scheduling Algorithms
by: Maysoon, A. Mohammed, et al.
Published: (2015)
by: Maysoon, A. Mohammed, et al.
Published: (2015)
CPU scheduling with a round Robin algorithm based on an effective time slice
by: Tajwar, Mohammad M., et al.
Published: (2017)
by: Tajwar, Mohammad M., et al.
Published: (2017)
The lowdown on the AES
by: Habib, Shahanaaz
Published: (2012)
by: Habib, Shahanaaz
Published: (2012)
Design of an Ultra High Speed AES Processor for Next Generation IT Security.
by: Aris, Ishak, et al.
Published: (2011)
by: Aris, Ishak, et al.
Published: (2011)
CPU Thread Prioritization Using a Dynamic Quantum Time Round-Robin Algorithm
by: Mohammed, Maysoon A., et al.
Published: (2016)
by: Mohammed, Maysoon A., et al.
Published: (2016)
Increasing Data Anonymity using AES and Privacy Technique
by: Thamer Khalil, Esmeel, et al.
Published: (2019)
by: Thamer Khalil, Esmeel, et al.
Published: (2019)
CPU Burst Processes Prioritization Using Priority Dynamic Quantum Time Algorithm: A Comparison with Varying Time Quantum and Round Robin Algorithms
by: Mohammed, Maysoon A., et al.
Published: (2015)
by: Mohammed, Maysoon A., et al.
Published: (2015)
Multi-queue CPU Process Prioritization using a Dynamic Quantum Time Algorithm Compared with Varying Time Quantum and Round-Robin Algorithms
by: Mohammed, Maysoon A., et al.
Published: (2016)
by: Mohammed, Maysoon A., et al.
Published: (2016)
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
by: Moh, Heng Huong
Published: (2014)
by: Moh, Heng Huong
Published: (2014)
Security in robot operating system (ROS) by using Advanced Encryption Standard (AES)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
AES bukan terbaik
by: Yusoff Bakri, Mohamad Hafiz
Published: (2019)
by: Yusoff Bakri, Mohamad Hafiz
Published: (2019)
Data transmission using aes encryption via email and sms
by: Arif Hanafi, Sharif Katullah
Published: (2013)
by: Arif Hanafi, Sharif Katullah
Published: (2013)
Selective video encryption algorithm based on H.264/AVC and AES
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
Effective implementation of AES-XTS on FPGA
by: Ahmed, Shakil, et al.
Published: (2011)
by: Ahmed, Shakil, et al.
Published: (2011)
Development of Helicobacter pylori BabA minimal binding domain as a novel biomimetic moiety for gastric-targeted drug delivery
by: Mohammed, Aymen
Published: (2020)
by: Mohammed, Aymen
Published: (2020)
Examining the round trip time and packet length effect on window size by using the Cuckoo search algorithm
by: Abubakar, Adamu, et al.
Published: (2016)
by: Abubakar, Adamu, et al.
Published: (2016)
Advanced Encryption Standard (AES)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
The round wardrobe
by: Mohammad Faiz Azmi, Ahmad Nordin
Published: (2011)
by: Mohammad Faiz Azmi, Ahmad Nordin
Published: (2011)
Propositional satisfiability algorithm to find minimal reducts for data mining
by: Bakar, A.A., et al.
Published: (2002)
by: Bakar, A.A., et al.
Published: (2002)
Risk minimization, regret minimization and progressive hedging algorithms
by: Sun, Jie, et al.
Published: (2020)
by: Sun, Jie, et al.
Published: (2020)
AES encryption of resource allocation for ultra-reliable and enhanced mobile broadband IoT applications in fog network
by: Ahmed Alqourabah, Eissa Abdulsalam
Published: (2022)
by: Ahmed Alqourabah, Eissa Abdulsalam
Published: (2022)
Video encryption using computation between H.264/AVC and AES encryption algorithm
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm
by: Hintaw, Ahmed Jameel
Published: (2023)
by: Hintaw, Ahmed Jameel
Published: (2023)
Randomness improvement of AES using MKP
by: Al-Alak, Saif, et al.
Published: (2013)
by: Al-Alak, Saif, et al.
Published: (2013)
The extensions on algebraic attack in AES cryptosystem
by: RezaeiPour, Davood, et al.
Published: (2009)
by: RezaeiPour, Davood, et al.
Published: (2009)
Round-the-world print
by: Castleden, Susanna
Published: (2013)
by: Castleden, Susanna
Published: (2013)
Window size and round-trip-time in a network transmission session
by: Ibrahim, Adamu Abubakar, et al.
Published: (2018)
by: Ibrahim, Adamu Abubakar, et al.
Published: (2018)
Cycle time minimization in production line using robust hybrid optimization algorithm
by: Noorazliza, Sulaiman, et al.
Published: (2021)
by: Noorazliza, Sulaiman, et al.
Published: (2021)
IoT data encryption algorithm for security
by: Kanaan Ismael, Marwan
Published: (2020)
by: Kanaan Ismael, Marwan
Published: (2020)
Finding the lost Submarine: The mystery of AE1
by: Seal, Graham
Published: (2008)
by: Seal, Graham
Published: (2008)
Pursue dual-award MBA at AeU
Published: (2010)
Published: (2010)
AeU teams up with Indian counterparts
Published: (2010)
Published: (2010)
The Merry-Go-Round by the Sea
by: Kinsella, John
Published: (2010)
by: Kinsella, John
Published: (2010)
All-rounded aspiring accountants
by: Star
Published: (2019)
by: Star
Published: (2019)
A framework for GPU-accelerated AES-XTS encryption in mobile devices
by: Alomari, Mohammad Ahmed, et al.
Published: (2011)
by: Alomari, Mohammad Ahmed, et al.
Published: (2011)
A modified approach to improve the performance of AES using feistel structure
by: Al-Ansi, Afeef Yahya Ahmed
Published: (2018)
by: Al-Ansi, Afeef Yahya Ahmed
Published: (2018)
Similar Items
-
Securing cloud data system (SCDS) for key exposure using AES algorithm
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021) -
Secure mobile AES encryptor (SMAE)
by: Satia, Anbalagan
Published: (2016) -
A Proposed Priority Dynamic Quantum Time Algorithm to Enhance Varying Time Quantum Round Robin Algorithm
by: Mohammed, Maysoon A., et al.
Published: (2016) -
Information Security Analysis and Solution using LSB Steganography and
AES Cryptographic Algorithm
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023) -
Queueing Theory Study of Round Robin Versus Priority Dynamic Quantum Time Round Robin Scheduling Algorithms
by: Maysoon, A. Mohammed, et al.
Published: (2015)