Search Results - ((((encryption algorithm) OR (evolutionary algorithm))) OR (generation algorithm))

Refine Results
  1. 1

    Parallel Processing of RSAAlgorithm Using MPI Library by Wan Dagang, Wan Rahaya

    Published 2006
    “…The scope of this project is developing a parallel system to generate public and private key, and to encrypt and decrypt files using the algorithm of RSA. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…A key schedule algorithm is the mechanism that generates and schedules all session-keys for the encryption process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki by Hamad Zaki, Ahmad Wafiy Hamad Zaki

    Published 2013
    Subjects: “…Evolutionary programming (Computer science). Genetic algorithms…”
    Get full text
    Get full text
    Student Project
  6. 6

    An enhanced color image encryption algorithm using LT-PRNG by Mohammed Ismael, Saba

    Published 2018
    “…In this study, a hybrid chaotic map based on logistic map and tent map is proposed for generating a random sequence for enhancing the encryption performance of image encryption algorithms. …”
    Get full text
    Get full text
    Thesis
  7. 7

    An Upgrade on the Key Generation Algorithm of the GGH-MKA Lattice-Based Encryption Scheme by Arif Mandangan, Kamarulhaili, H., Asbullah, M. A.

    Published 2021
    “…This paper presents an upgrade on the key generation algorithm of a current variant of the Goldreich-Goldwasser-Halevi lattice-based encryption scheme, referred to as the GGH-MKA cryptosystem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Encryption selection for WLAN IEEE802.11G by Ahmad, Zahrol Azam

    Published 2013
    “…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…Encryption and decryption times measured between 5 and 27 m sec in 2 GHz Pentium and java platform so time variant and fast enough key generation had been kept collision and timing attacks away due to small seized storage. …”
    Get full text
    Get full text
    Article
  11. 11

    Data privacy comparison using advanced encryption standard (AES) and data encryption standard (DES) / Hikma Farah Ali by Ali, Hikma Farah

    Published 2019
    “…In this project using the AES algorithm, it benefits to encryption and decryption and it avoids the time delay. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An upgrade on the key generation algorithm of the GGH-MKA lattice-based encryption scheme by Arif, Mandangan, Kamarulhaili, Hailiza, Asbullah, Muhammad Asyraf

    Published 2021
    “…This paper presents an upgrade on the key generation algorithm of a current variant of the Goldreich-Goldwasser-Halevi lattice-based encryption scheme, referred to as the GGH-MKA cryptosystem. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Mobile game application development using evolutionary algorithms by Ong, Jia Hui

    Published 2014
    “…Since it involves human users, adding Interactive Evolutionary Algorithm (IEA) together with EP has allowed further rules to be generated that are based on the user’s preferences. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16
  17. 17

    Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security by H. Belgassem, Seddeq

    Published 2004
    “…The computation results show that the key generation process using the modified algorithm is around three times faster than the old implementation. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A novel enhancement technique of the hill cipher for effective cryptographic purposes. by Abidin, A.F.A., Chuan, O.Y., Kamel Ariffin, Muhammad Rezal

    Published 2011
    “…A random matrix key, RMK is introduced as an extra key for encryption. An algorithm proposed for involutory key matrix generation is also implemented in the proposedalgorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Forecasting solar power generation using evolutionary mating algorithm-deep neural networks by Mohd Herwan, Sulaiman, Zuriani, Mustaffa

    Published 2024
    “…This paper proposes an integration of recent metaheuristic algorithm namely Evolutionary Mating Algorithm (EMA) in optimizing the weights and biases of deep neural networks (DNN) for forecasting the solar power generation. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis