Search Results - (( developing integrator encryption algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- developing integrator »
- integrator encryption »
- application stemming »
- stemming algorithm »
- java application »
-
1
Encrypted email using 3D AES block cipher algorithm / Khairah Mohd Wi
Published 2015“…The purpose of this project is to develop encrypted email application equip with confidentiality and integrity message using 3D-AES block cipher for confidential and integrity. …”
Get full text
Get full text
Thesis -
2
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…It have increase complexity of process encryption and decryption. New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. …”
Get full text
Get full text
Thesis -
3
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025“…The system integrates multiple robust encryption algorithms—AES-128, AES-256, ChaCha20, and Twofish—for end-to-end data protection. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Serpent encryption algorithm implementation on Compute Unified Device Architecture (CUDA)
Published 2010“…Result based on the integration of multiple block encryption in parallel shows throughput performance of up to 100MB/s or more than 7X performance gain.…”
Get full text
Get full text
Conference or Workshop Item -
5
Serpent encryption algorithm implementation on Compute Unified Device Architecture (CUDA)
Published 2010“…Result based on the integration of multiple block encryption in parallel shows throughput performance of up to 100MB/s or more than 7X performance gain.…”
Get full text
Get full text
Conference or Workshop Item -
6
-
7
VHDL implementation of DES algorithm / Emmanvel Kajan Mering
Published 2004Get full text
Get full text
Thesis -
8
Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map
Published 2023“…Additionally, the Latin square matrix stands out for its uniform histogram distribution, thereby bolstering its encryption's potency. The consequent integration of these algorithms in this study was therefore grounded in the scientific rationale of establishing a strong and resilient cypher technique. …”
Get full text
Get full text
Get full text
Article -
9
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
Published 2017“…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. …”
Get full text
Get full text
Get full text
Thesis -
10
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…In order to more effectively incorporate both present technology and developing technology, models of DNA cryptography need to be developed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
A faster version of rijndael cryptographic algorithm using cyclic shift and bit wise operations
Published 2009“…Doing arithmetic in finite field is the key part to the implementation of communication and coding system including the newly developed Rijndael the Advanced Encryption Standard (AES). …”
Get full text
Get full text
Article -
12
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
Published 2004“…Doing arithmetic in finite field is the key part to the implementation of communication and coding system including the newly developed Rijndael the Advanced Encryption Standard (AES). …”
Get full text
Get full text
Thesis -
13
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
14
Security enhancement of digital motion image transmission using hybrid AES-DES algorithm
Published 2023“…Understanding the need to minimize algebraic attacks into the AES, this paper proposes the idea on integrating AES within the Feistel network of DES, hence resulting into the development of the Hybrid AES-DES algorithm. …”
Conference paper -
15
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…Upon verification, a demonstration application prototype that performs RSA encryption and decryption is developed using Visual Basic 6.0. …”
Get full text
Get full text
Thesis -
16
Design of an advanced encryption standard crypto-processor core for field programmable gate array implementation
Published 2006“…The processors perform their respective dedicated algorithm-intensive computations. This thesis presents the architecture for implementation of the new Advanced Encryption Standard (AES) in hardware for operating under SoC environment. …”
Get full text
Get full text
Thesis -
17
-
18
Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.]
Published 2018“…The result shows about 100% of similarity between both files. File integrity is also measured and the results show the hashing value of the encrypted file was different compared to the original file…”
Get full text
Get full text
Get full text
Article -
19
Secured route optimization in mobile IPv6 wireless networks in terms of data integrity
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm at a cost of a small increase in delay. …”
Get full text
Get full text
Conference or Workshop Item -
20
Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
Published 2013“…Also the parallel AES-XTS encryption and decryption design were used to develop integrated chip of AES-XTS on FPGA. …”
Get full text
Get full text
Thesis
