Search Results - (( developing cipher based algorithm ) OR ( java simulation optimization algorithm ))
Search alternatives:
- developing cipher »
- java simulation »
- cipher based »
-
1
A block cipher based on genetic algorithm
Published 2016“…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Development of DNA-based dynamic key-dependent block cipher
Published 2015“…Hence, it is necessary to research and develop a secure symmetric cipher algorithm. Since the declaration of Rijndael as AES this cipher has been the target of many attacks, and the attempts to break it are ongoing and even increasing everyday by taking advantage of the rapid development in computing capabilities. …”
Get full text
Get full text
Thesis -
4
Analysis and Modification of Grain - 128 Stream Cipher Algorithm
Published 2024thesis::master thesis -
5
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
6
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
Published 2006“…The algorithm is based on the Clonalg algorithm developed by de Castro and Von Zuben. …”
Get full text
Get full text
Conference or Workshop Item -
7
Algorithm animation for cryptanalysis of caesar and hill ciphers / Sapiee Haji Jamel and Giuseppina Sherry Sayan
Published 2009“…Cryptographic algorithms are usually kept secret and the complexity of each algorithm is based on mathematical or statistical analysis. …”
Get full text
Get full text
Get full text
Article -
8
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…The module of a KD-3DCA block cipher is designed and algorithms of the new KD-3D-CA block cipher are generated. …”
Get full text
Get full text
Thesis -
9
An Improved Rectangle Lightweight Block Cipher Based On 3d Rotation Method
Published 2024thesis::doctoral thesis -
10
Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security
Published 2010“…The nonlinearity and differential uniformity tests by MIMOS Cyber-security Laboratory showed the standing of UCE S-Box to be equivalent to that of Khazad’s block ciphers. Collaborative research with MIMOS Cyber-security Laboratory are using the strong UCE S-Boxes to develop hybrid round functions and key distribution algorithms to construct the UCE block cipher. …”
Get full text
Get full text
Proceeding Paper -
11
Designing substitution boxes based on chaotic map and globalized firefly algorithm
Published 2019“…This thesis aim to provide a new design for 8 × 8 S-boxes based on firefly algorithm (FA) optimization. The FA is a newly developed metaheuristic algorithm inspired by fireflies and their flash lighting process. …”
Get full text
Get full text
Thesis -
12
Implementation and integration of HF messaging system with cryptographic features
Published 2006“…In order to keep information secured while transmission, the system was incorporated with cipher algorithms. The block cipher AES (Advanced Encryption Standard) is used for authentication and key distribution while the stream cipher that is based on the linear feedback shift register (LFSR) is used for confidentiality. …”
Get full text
Get full text
Get full text
Thesis -
13
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…Cryptographic ciphers depend on how quickly the key affects the output of the ciphers (ciphertext). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
15
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…This research proposed a new Key Schedule Algorithm based on the coordinate geometry of a Hybrid Cube (KSAHC) for the non-binary block cipher. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Encrypted mobile messaging application using 3D-AES block cipher cryptography algorithm / Aida Najihah Mohd Khlubi
Published 2019“…The process of securing the text is by using the 3Dimensional-Advanced Encryption Standard (3D-AES) block cipher algorithm. Android Studio software is used in developing the project. …”
Get full text
Get full text
Student Project -
17
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
18
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
19
A Hybrid Chaotic Image Encryption Scheme Bas~d on S-Box and Ciphertext Feedback
Published 2007“…, 2006]. The first cipher is a generic chaotic block cipher. It is shown that the proposed cipher is insecure against differential and knownplaintext attacks. …”
Get full text
Get full text
Thesis -
20
Systematic literature review: Trend analysis on the design of lightweight block cipher
Published 2024journal::journal article
