Search Results - (( developing construct encryption algorithm ) OR ( java data pollination algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…These three keys are referred to collectively as the EAES encryption key. The construction of this key prioritises the highest possible level of safety.…”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…Triangular Coordinate Extraction (TCE) technique has also been introduced to extract the coordinates during the rotation of Hybrid Cube surface (HCs) and plays an important role in the development of KSAHC algorithm. The Hybrid Cube Encryption Algorithm (HiSea) has been implemented to validate the encryption keys that are generated from the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A DNA-Inspired Symmetric Lightweight Block Cipher With Strong Randomness Properties by Nik Azura binti Nik Abdullah

    Published 2026
    “…The Correlation Coefficient values, indicate that the DNA P-Box being tested exhibits a strong avalanche effect, which also implies that the constructed DNA P-Box should operate as a secure component in an encryption algorithm. …”
    thesis::doctoral thesis
  7. 7

    Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol by Al-Alak, Saif M. Kh.

    Published 2014
    “…The study shows that the developed algorithms MKPAES and DMAC increase the performance of the WSN and improve the system resistance to attacks on the WSN. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure by Asbullah, Muhammad Asyraf

    Published 2015
    “…Rabin cryptosystem has fast encryption and proven as secure as the integer factorization problem. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation by Shamsiah, Suhaili, Norhuzaimin, Julai, Asrani, Lit, Maimun Binti, Huja Hussin, Mohamad Faizrizwan bin, Mohd Sabri

    Published 2022
    “…Several cryptographic SHA-256 hash algorithms have been developed to enhance the performance of data-protection techniques. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  10. 10
  11. 11

    Enhancement of Security Architecture for Smartcard Based Authentication Protocols by Mohammed, Lawan Ahmed

    Published 2004
    “…To identify the best cryptographic algorithm suitable for smartcard applications, the dissertation also investigates the implementation of Elliptic Curve encryption techniques and presents performance comparisons based on similar techniques. …”
    Get full text
    Get full text
    Thesis