Search Results - (( effective implementation encryption algorithm ) OR ( java implementation based algorithm ))
Search alternatives:
- implementation encryption »
- implementation based »
- java implementation »
-
1
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Experimental results indicate that as the thread level increases, the encryption and decryption time, which is the most time consuming operation, decreases which shows an improved speed of the RSA cryptosystem.The proposed implementation has a great potential to effectively deal with the RSA algorithm slow speed.…”
Get full text
Get full text
Get full text
Article -
2
Effect of file sizes on encryption and decryption in constrained devices / Nurnadia Sapri
Published 2015“…Therefore, AES-128 gives higher confidentiality compared to RSA-2048 and it will be most suitable encryption algorithm to be implemented in the TCP protocol.…”
Get full text
Get full text
Thesis -
3
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…Performance has always been the most critical characteristic of a cryptographic algorithm, which determines its effectiveness. In this research the most popular and used algorithm, which is RSA, is implemented with a new modification in order to reduce the calculation time of the algorithm. …”
Get full text
Get full text
Thesis -
4
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…AES is the next generation encryption algorithm replacing the older version which is DES and Triple DES. …”
Get full text
Get full text
Thesis -
5
Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin
Published 2018“…Testing algorithm will compute number of bit errors and bit error rate by comparing encryption and decryption. …”
Get full text
Get full text
Thesis -
6
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…Several chaos-based image encryption algorithms use low-dimension chaos as the encryption tools. …”
Get full text
Get full text
Thesis -
7
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…This method also can be implemented in GUI to make the calculation of encryption and decryption process faster instead of calculating manually.…”
Get full text
Get full text
Student Project -
8
Analysis of avalanche effect on advance encryption standard by using dynamic S-Box depends on rounds keys
Published 2014“…The aim of this paper is to design dynamic S-Box which depends on rounds keys for encryption in AES-128. The parameters of the dynamic S-Box have features equivalent to those in the normal algorithm AES. …”
Get full text
Get full text
Conference or Workshop Item -
9
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
10
-
11
Design and Implementation of a Genetic Algorithm-Based Block Cipher For Enhanced Cryptographic Security
Published 2025conference output::conference proceedings::conference paper -
12
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
13
Security analysis of data transmission in an IoT based platform for telemedicine
Published 2021“…Using less power, the proposed architecture is implemented based on python programming language, thereby improving time and power requirements compared to the traditional algorithm. …”
Get full text
Get full text
Get full text
Article -
14
A New Hybrid Image Encryption Technique Using Lorenz Chaotic System and Simulated Kalman Filter (SKF) Algorithm
Published 2022“…Nowadays, encryption is one of the most popular and effective security methods used by company and organizations. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
16
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
17
Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
Published 2013“…This standard uses AESXTS as a building block for the protection of data. For an effective storage encryption implementation, two well known methods are software based encryption and hardware based encryption. …”
Get full text
Get full text
Thesis -
18
Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.]
Published 2018“…This application implements an Advance Encryption Standard (AES) to enhance the steganography security by encrypting the information and as such, only the intended recipient can read the data. …”
Get full text
Get full text
Get full text
Article -
19
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
20
A chaotic neural network based encryption algorithm for MPEG-2 encoded video signal
Published 2012Get full text
Working Paper
