Search Results - (( developing external encryption algorithm ) OR ( java application reoptimize algorithm ))

  • Showing 1 - 3 results of 3
Refine Results
  1. 1

    Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi by Husairi, Nurul Syazwani, Mohd Fauzi, Nurul Aqilah

    Published 2023
    “…Even though this algorithm alone can satisfy the need of ciphertext cryptosystem, it is vulnerable to numerous internal and external attackers such as logjam and dictionaries attack. …”
    Get full text
    Get full text
    Student Project
  2. 2
  3. 3

    Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA by Ahmed, Shakil

    Published 2013
    “…Also the parallel AES-XTS encryption and decryption design were used to develop integrated chip of AES-XTS on FPGA. …”
    Get full text
    Get full text
    Thesis