Search Results - (( differential equation algorithm ) OR ( differential encryption algorithm ))

Refine Results
  1. 1

    Dynamic determinant matrix-based block cipher algorithm by Juremi, Julia

    Published 2018
    “…Analyses on linear, differential and short attack will be performed against the DDBC algorithm to estimate the possible success of all three attacks. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption by Nurnajmin Qasrina Ann, Ayop Azmi

    Published 2023
    “…It is a solution to a set of differential equations known as the Lorenz Equations, which Edward N. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP) by Khan, M.A., Ali, A., Jeoti, V., Manzoor, S.

    Published 2018
    “…Substitution box is a vital and the only nonlinear component of modern encryption algorithm. S-box is introduced as a confusion component to resist against differential cryptanalysis. …”
    Get full text
    Get full text
    Article
  4. 4

    A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP) by Khan, M.A., Ali, A., Jeoti, V., Manzoor, S.

    Published 2018
    “…Substitution box is a vital and the only nonlinear component of modern encryption algorithm. S-box is introduced as a confusion component to resist against differential cryptanalysis. …”
    Get full text
    Get full text
    Article
  5. 5

    A novel image encryption using an integration technique of blocks rotation based on the Magic cube and the AES Algorithm by Abugharsa, Ahmed Bashir, Hasan Basari, Abd Samad, Almangush, Hamida

    Published 2012
    “…Finally, experimental results and security analysis show that the proposed image encryption scheme not only encrypts the picture to achieve perfect hiding, but the algorithm can also withstand exhaustive, statistical and differential attacks.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A new image encryption algorithm based on single S-box and dynamic encryption step by Wang, Ji Jun, Tan, Soo Fun

    Published 2021
    “…Under the control of the dynamic encryption step algorithm, it effectively destroys the correlation between the source image’s pixels. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Experiment
  8. 8

    Study on numerical solution of a variable order fractional differential equation based on symmetric algorithm by Liu, Jingrui, Pan, Dongyang

    Published 2019
    “…Numerical solution algorithm for a class of fractional differential equations with transformed arrays based on the proposed symmetry algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Efficient dynamic DNA-based block cipher algorithm by Chng, Chern Wei

    Published 2023
    “…The DNA-based MixColumns operation functions as a pseudo-random number generator, generating an encrypted random number for the purpose of encryption. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A Hybrid Chaotic Image Encryption Scheme Bas~d on S-Box and Ciphertext Feedback by MUHAMMAD ASIM

    Published 2007
    “…is a complete image encryption scheme. This scheme is also shown insecure against the differential attack in the thesis. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…Long and variable key length made key exhaustive search and differential attack impossible. None fixed size key caused avoidance of replaying and other attacks that can happen on fixed sized key algorithms. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    An algorithm for positive solution of boundary value problems of nonlinear fractional differential equations by Adomian decomposition method by A. I., Md. Ismail, Hytham. A., Alkresheh

    Published 2016
    “…In the proposed algorithm the boundary conditions are used to convert the nonlinear fractional differential equations to an equivalent integral equation and then a recursion scheme is used to obtain the analytical solution components without the use of undetermined coefficients. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Cryptanalysis and design of chaos based image encryption schemes by Wong , Kuan Wai

    Published 2025
    “…Furthermore, we present a grayscale image encryption scheme utilizing a permutation-diffusion architecture, as well as a color image encryption scheme based on a genetic algorithm and the 2D-SHCM. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15
  16. 16
  17. 17

    A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata by Hamdi, Ayman Majid

    Published 2019
    “…Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Differential equation fault location algorithm with harmonic effects in power system by Izatti, Md Amin, Mohd Rafi, Adzman, Haziah, Abdul Hamid, Muhd Hafizi, Idris, Melaty, Amirruddin, Omar, Aliman

    Published 2023
    “…This study focuses on a single line-to-ground (SLG) fault location algorithm in a power system distribution network based on fundamental frequency measured using the differential equation method. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Parallel block backward differentiation formulas for solving ordinary differential equations. by Othman, Khairil Iskandar, Ibrahim, Zarina Bibi, Suleiman, Mohamed

    Published 2008
    “…A parallel block method based on Backward Differentiation Formulas (BDF) is developed for the parallel solution of stiff Ordinary Differential Equations (ODEs). …”
    Get full text
    Article