J Cao, J Gao - International Journal of Network Security, 2025 - ijns.jalaxy.com.tw
This paper briefly introduces the advanced encryption standard (AES) algorithm. In order to improve its performance, the number of encryption rounds was reduced, and the S-box table …
D Bian, J Pan, Y Wang - Journal of Cyber Security and …, 2022 - journals.riverpublishers.com
The involvement of the Internet in the production of daily life has increased the demand for the security of private data on the Internet. This paper briefly introduced the principles of …
J Shan, H Ma - International Journal of Network Security, 2023 - ijns.jalaxy.com.tw
Encryption of data is an effective means of securing network communication. This paper briefly introduced the advanced encryption standard (AES) algorithm. It utilized the Rivest …
D Bian, J Pan, Y Wang - journals.riverpublishers.com
The algorithms used to encrypt data for network transmission are divided into symmetric encryption, asymmetric encryption, and hash encryption. Among them, hash encryption uses …