Search Results - (( based encryption method algorithm ) OR ( a constructive based algorithm ))
Search alternatives:
- constructive based »
- encryption method »
- method algorithm »
- a constructive »
-
1
A new image encryption algorithm based on single S-box and dynamic encryption step
Published 2021“…This paper presents an efficient and secure chaotic-based S-box image encryption scheme. Firstly, a single S-box with a size of 10 × 26 was constructed by using a low-dimensional chaotic system. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Experiment -
2
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…Hybrid chaos has several excellent characteristics and can overcome some drawbacks of low-dimension chaos. In this study, a hybrid chaotic map based on logistic map and tent map is proposed for generating a random sequence for enhancing the encryption performance of image encryption algorithms. …”
Get full text
Get full text
Thesis -
3
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…In order to more effectively incorporate both present technology and developing technology, models of DNA cryptography need to be developed. MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…The utilisation of four sets of 4 x 4 S-Box structures contributes to the simplicity and stability of the S-Box construction. The proposed method involves utilising DNA-based components consisting of the nucleotides {A, T, G, C} to generate a novel Dynamic DNA-based S-Box. …”
Get full text
Get full text
Thesis -
5
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…This research also proposes a new method namely RotateSwapDeterminant function that uses rotation and swapping of the bit based on the 4x4 determinant computations and will act as the permutation layer in the DDBC algorithm. …”
Get full text
Get full text
Thesis -
6
-
7
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
Published 2004“…The objective of this research in primarily to find the best fit crytography system that can encrypt and decrypt the extension file .doc, implement it in a simple application which works similar to email and construct and run a set of evaluation to securing plaintext file in a web based environment. …”
Get full text
Get full text
Get full text
Thesis -
8
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
9
-
10
Performance analysis and improvement of rabin primitive based cryptosystems
Published 2014“…The AAβ cryptosystem is constructed based on the mathematical problem of solving the Square Root Modulo and Integer Factorization problem. …”
Get full text
Get full text
Get full text
Thesis -
11
Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation
Published 2022“…The purpose of this project is to reduce dynamic thermal power dissipation of SHA-256 unfolding transformation. State encoding is a method used in reducing power design strategies that have been proposed to lower the dynamic power dissipation of the algorithm. …”
Get full text
Get full text
Get full text
Proceeding -
12
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis -
13
Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits
Published 2017Get full text
Get full text
Conference or Workshop Item -
14
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
Published 2015“…In this thesis, we also develop a new cryptographic hard problem based on a special instance of a linear Diophantine equation in two variables, with some provided restrictions and carefully selected parameters. …”
Get full text
Get full text
Thesis -
15
Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari
Published 2014“…Nowadays, there are a lot of cryptography method has been applied. One of the most popular cryptography methods is Advance Encryption Standard (AES). …”
Get full text
Get full text
Thesis -
16
An improved chaotic image encryption algorithm
Published 2018“…Chaotic-based image encryption algorithms are countless in number. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
Get full text
Get full text
Get full text
Article -
18
An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm
Published 2017Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
-
20
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article
