Search Results - (( based encryption method algorithm ) OR ( based constructive based algorithm ))

Refine Results
  1. 1

    A new image encryption algorithm based on single S-box and dynamic encryption step by Wang, Ji Jun, Tan, Soo Fun

    Published 2021
    “…This paper presents an efficient and secure chaotic-based S-box image encryption scheme. Firstly, a single S-box with a size of 10 × 26 was constructed by using a low-dimensional chaotic system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Experiment
  2. 2

    An enhanced color image encryption algorithm using LT-PRNG by Mohammed Ismael, Saba

    Published 2018
    “…In this study, a hybrid chaotic map based on logistic map and tent map is proposed for generating a random sequence for enhancing the encryption performance of image encryption algorithms. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Efficient dynamic DNA-based block cipher algorithm by Chng, Chern Wei

    Published 2023
    “…The utilisation of four sets of 4 x 4 S-Box structures contributes to the simplicity and stability of the S-Box construction. The proposed method involves utilising DNA-based components consisting of the nucleotides {A, T, G, C} to generate a novel Dynamic DNA-based S-Box. …”
    Get full text
    Get full text
    Thesis
  4. 4

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Dynamic determinant matrix-based block cipher algorithm by Juremi, Julia

    Published 2018
    “…The performance analysis in terms of processing speed of the encryption and decryption process of the DDBC algorithm shows minimal differences in both AES and DDBC algorithm despite of the difference method of transformation used in both algorithms. …”
    Get full text
    Get full text
    Thesis
  6. 6

    The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment by Hasnira, Md. Lazim

    Published 2004
    “…The methodology and testing procedure which are used during this evaluation is based on a simulation model. Result from the evaluation set constructed is found able to show the performance of the cryptography system. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
    Get full text
    Thesis
  9. 9
  10. 10

    Performance analysis and improvement of rabin primitive based cryptosystems by Mahad, Zahari

    Published 2014
    “…The AAβ cryptosystem is constructed based on the mathematical problem of solving the Square Root Modulo and Integer Factorization problem. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation by Shamsiah, Suhaili, Norhuzaimin, Julai, Asrani, Lit, Maimun Binti, Huja Hussin, Mohamad Faizrizwan bin, Mohd Sabri

    Published 2022
    “…In constructing the SHA-256 algorithm, high speed, compact size, and low power consumption are all factors to be taken into account for an efficient implementation. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  12. 12

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The evaluation of the security of the proposed scheme is based on SVO logic to verify the security of the informal method. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure by Asbullah, Muhammad Asyraf

    Published 2015
    “…We reason that the proposed cryptographic hard problem can be used for developing practical cryptographic constructions. In parallel, we review the AAb cryptosystem based on the design of Rabin-p function over integers and also as a demonstration of the proposed cryptographic hard problem concept. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari by Mohammad Zahari, Mohamad Zakirin

    Published 2014
    “…Nowadays, there are a lot of cryptography method has been applied. One of the most popular cryptography methods is Advance Encryption Standard (AES). …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Enhancement of Security Architecture for Smartcard Based Authentication Protocols by Mohammed, Lawan Ahmed

    Published 2004
    “…To identify the best cryptographic algorithm suitable for smartcard applications, the dissertation also investigates the implementation of Elliptic Curve encryption techniques and presents performance comparisons based on similar techniques. …”
    Get full text
    Get full text
    Thesis
  20. 20