Search Results - (( a constructive method algorithm ) OR ( based encryption method algorithm ))

Refine Results
  1. 1

    A new image encryption algorithm based on single S-box and dynamic encryption step by Wang, Ji Jun, Tan, Soo Fun

    Published 2021
    “…This paper presents an efficient and secure chaotic-based S-box image encryption scheme. Firstly, a single S-box with a size of 10 × 26 was constructed by using a low-dimensional chaotic system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Experiment
  2. 2

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…In order to more effectively incorporate both present technology and developing technology, models of DNA cryptography need to be developed. MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    An enhanced color image encryption algorithm using LT-PRNG by Mohammed Ismael, Saba

    Published 2018
    “…Hybrid chaos has several excellent characteristics and can overcome some drawbacks of low-dimension chaos. In this study, a hybrid chaotic map based on logistic map and tent map is proposed for generating a random sequence for enhancing the encryption performance of image encryption algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata by Mohamad Hata, Mohsen

    Published 2019
    “…This new approach of constructing two layers of deniability techniques is done in a manner of defining a protocol to embed and implementing them. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Efficient dynamic DNA-based block cipher algorithm by Chng, Chern Wei

    Published 2023
    “…The utilisation of four sets of 4 x 4 S-Box structures contributes to the simplicity and stability of the S-Box construction. The proposed method involves utilising DNA-based components consisting of the nucleotides {A, T, G, C} to generate a novel Dynamic DNA-based S-Box. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Dynamic determinant matrix-based block cipher algorithm by Juremi, Julia

    Published 2018
    “…This research also proposes a new method namely RotateSwapDeterminant function that uses rotation and swapping of the bit based on the 4x4 determinant computations and will act as the permutation layer in the DDBC algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    A parallel version of a binary method and vector addition chains precomputation for exponentiation in RSA / Siti Khatijah Nor Abdul Rahim and Siti Rozanae Ismail by Abdul Rahim, Siti Khatijah Nor, Ismail, Siti Rozanae

    Published 2006
    “…However, we also constructed an algorithm for a parallel version of Vector Addition Chains to enhance the performance. …”
    Get full text
    Get full text
    Research Reports
  9. 9

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
    Get full text
    Thesis
  10. 10

    Performance analysis and improvement of rabin primitive based cryptosystems by Mahad, Zahari

    Published 2014
    “…Finally, we amend the Rabin cryptosystem utilizing the encryption strategy of the AAβ algorithm and run experiments to gauge its efficiency.…”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure by Asbullah, Muhammad Asyraf

    Published 2015
    “…Existing methods exploit some mathematical object or put paddings and redundancies into the message, whilst the new proposed method opens up a refreshing window of research into the problem. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation by Shamsiah, Suhaili, Norhuzaimin, Julai, Asrani, Lit, Maimun Binti, Huja Hussin, Mohamad Faizrizwan bin, Mohd Sabri

    Published 2022
    “…The purpose of this project is to reduce dynamic thermal power dissipation of SHA-256 unfolding transformation. State encoding is a method used in reducing power design strategies that have been proposed to lower the dynamic power dissipation of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  13. 13

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits by Hussien, Hassan Mansour, Muda, Zaiton, Md. Yasin, Sharifah

    Published 2017
    “…Confusion and diffusion are two properties of the operation a secure cipher. Therefore, although the two properties within the substitution-permutation construct are only applied to state the transformation round function of the Rijndael algorithm, but there is no other strong security for the key expansion function. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari by Mohammad Zahari, Mohamad Zakirin

    Published 2014
    “…Nowadays, there are a lot of cryptography method has been applied. One of the most popular cryptography methods is Advance Encryption Standard (AES). …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20