Search Results - (( developing key based algorithm ) OR ( java implication drops algorithm ))
Search alternatives:
- implication drops »
- java implication »
- developing key »
- key based »
-
1
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
2
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…This research proposed a new Key Schedule Algorithm based on the coordinate geometry of a Hybrid Cube (KSAHC) for the non-binary block cipher. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
A hybrid database encryption algorithm based on reverse string and dynamic key
Published 2016Get full text
Get full text
Conference or Workshop Item -
4
A block cipher based on genetic algorithm
Published 2016“…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
Get full text
Get full text
Get full text
Thesis -
5
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
Published 2012“…The system depends on the base "If you enter a true key, you obtain to the truth information, but if you enter the false key; you obtains to the false information."…”
Get full text
Get full text
Get full text
Thesis -
6
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Thus, it is suitable for mobile devices, it uses 160 bits key and provides the same security as RSA 1024 bits key.Some benefits are expected from this study to improve the encryption algorithm for mobile security.…”
Get full text
Get full text
Conference or Workshop Item -
7
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
8
Development of DNA-based dynamic key-dependent block cipher
Published 2015“…The DNAB utilizes the DNA-based key-dependent components to enhance the security of cipher, and reduce the number of cipher-iterated rounds. …”
Get full text
Get full text
Thesis -
9
Statistical fixed range multiple selection algorithm for peer-to-peer system
Published 2010“…This algorithm is developed based on the statistical knowledge about the uniform distribution nature of the data which has been arranged in ascending order in the local file. …”
Get full text
Get full text
Conference or Workshop Item -
10
Static range multiple selection algorithm for peer-to-peer system
Published 2011“…This algorithm is developed based on the statistical knowledge about the uniform distribution nature of the data which has been arranged according to certain order in the file. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…RSA Algorithm is a public-key cryptosystem that offers encryption technique which security is based on the difficulty of factoring large prime integers. …”
Get full text
Get full text
Final Year Project -
12
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…The proposed model is able to protect the DNA sequence stored in the Fog Computing cloud from plain text attacks by generating (I) the main key, which is the key to the EAES encryption algorithm, (II) the rule 1 key, which represents the DNA base number of possible key probabilities, and (III) the rule 2 key, which represents the number of binding probabilities for the DNA helical structure. …”
Get full text
Get full text
Get full text
Thesis -
13
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…Key scheduling algorithm (KSA) is the mechanism that generates and schedules all sub-keys for each round of encryption. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Conflict-free automated guided vehicles routing using multi-objective genetic algorithm
Published 2013“…The algorithm used weight mapping crossover (WMX) and Insertion Mutation (IM) for priority-based representation and parameterized uniform crossover (PUX) for random-key based representation. …”
Get full text
Get full text
Get full text
Article -
15
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Thesis -
16
Development of cell formation algorithm and model for cellular manufacturing system
Published 2011“…The performance of the proposed algorithm is compared with a number of key algorithms that reported in the corresponding scientific literature. …”
Get full text
Get full text
Thesis -
17
New approach of cryptography algorithm for e- mail applications
Published 2005“…The purpose of this paper is to introduce and demonstrate a new algorithm for Internet and e-mail security. The purposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Conference or Workshop Item -
18
-
19
A GA-based optimization for Fourth-order Sallen-Key low-pass filter
Published 2013Get full text
Working Paper -
20
Hybrid multiobjective genetic algorithm for integrated dynamic scheduling and routing of jobs and automated guided vehicles in flexible manufacturing systems
Published 2014“…Parameterized uniform crossover (PUX) and migration are used as genetic operators for sub-chromosomes represented using random-key based encoding. Computational experiments were conducted on the developed algorithm coded in Matlab to test the effectiveness of the algorithm. …”
Get full text
Get full text
Thesis
