Search Results - (( developing step encryption algorithm ) OR ( java deviation selection algorithm ))
Search alternatives:
- deviation selection »
- selection algorithm »
- developing step »
- step encryption »
- java »
-
1
Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari
Published 2014“…The enhanced AES-128 bit algorithm was omitted the mix column step from second round until the ninth round and being replaced with shift row step. …”
Get full text
Get full text
Thesis -
2
-
3
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Thesis -
4
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
Published 2014“…This recommended encryption algorithm also overcomes the flaw in Ariffin’s encryption procedure. …”
Get full text
Get full text
Get full text
Thesis -
5
Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique
Published 2020“…The proposed encryption scheme FHE is performed on the encrypted ECG data where FHE can be applied in any system by using a various public key algorithm. …”
Get full text
Get full text
Article -
6
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The development of the simulation model consists of seven steps. …”
Get full text
Get full text
Get full text
Thesis -
7
Design of an advanced encryption standard crypto-processor core for field programmable gate array implementation
Published 2006“…The result of this work is the first step to the ultimate goal of developing a complete cryptographic system processor for security application in embedded system design…”
Get full text
Get full text
Thesis -
8
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
9
Securing password authentication using MD5 algorithm
Published 2014“…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
Get full text
Get full text
Undergraduates Project Papers -
10
New approach of cryptography algorithm for e- mail applications
Published 2005“…The main steps in this algorithm started with reading the plain text "Original Message" from the user. …”
Get full text
Get full text
Conference or Workshop Item -
11
Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi
Published 2023“…Our main objective is to compute encryption process and develop decryption schemes using Mellin Transformation and to modify the basic El Gamal system with the application of Mellin-Kamal Transformation. …”
Get full text
Get full text
Student Project -
12
Improved scalar multiplication algorithm in affine coordinate system using elliptic net
Published 2022“…In elliptic curve encryption, scalar multiplication (SM) is the most expensive and time-consuming operation. …”
Get full text
Get full text
Get full text
Article
