Search Results - (( developing toward encryption algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing toward »
- implication based »
- java implication »
-
1
Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari
Published 2014“…In future, the test toward the strength of this enhanced AES-\ 28 bit algorithm should be conducted.…”
Get full text
Get full text
Thesis -
2
-
3
A block cipher based on genetic algorithm
Published 2016“…The development of block ciphers have resulted in a number of cryptographic algorithms such as, AES, ARIA, BLOWFISH256, DESL, 3D-AES and many more. …”
Get full text
Get full text
Get full text
Thesis -
4
Securing password authentication using MD5 algorithm
Published 2014“…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
Get full text
Get full text
Undergraduates Project Papers -
5
A new 128-bit block cipher
Published 2009“…The existence of this new 128-bit block cipher algorithm will increase the protection of the national information infrastructure and also will contribute as an alternative to other cryptographic algorithms in security in the computing industry.…”
Get full text
Get full text
Thesis -
6
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
Published 2015“…Moreover, for the purpose of empirical evidences, some parameters are chosen in the course of the process to validate the efficiency in terms of algorithmic running time and memory consumptions. We then conduct a comparative analysis toward estimating the running time during the encryption and decryption process. …”
Get full text
Get full text
Thesis -
7
-
8
-
9
-
10
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
11
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…There is also a need to develop a tool that contains the three approaches where the developer can customize the protection of the source code.…”
Get full text
Get full text
Thesis -
12
Design and implementation of a private and public key crypto processor for next-generation it security applications
Published 2006“…A demonstration application prototype in the form of a real-time secure e-document application has been developed to verify the functionality and validate the embedded system.…”
Get full text
Get full text
Get full text
Article
