Search Results - (( evolution information encryption algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- information encryption »
- evolution information »
- implication based »
- java implication »
-
1
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
Published 2012“…In addition, it uses two keys to encryption and decryption. However, this method needs to be develops and supports the protection of information. …”
Get full text
Get full text
Get full text
Thesis -
2
Comparison of ECC and RSA algorithms in IOT devices
Published 2019Get full text
Get full text
Article -
3
Systematic literature review: Trend analysis on the design of lightweight block cipher
Published 2024journal::journal article -
4
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
Published 2017“…In encryption, sensitive information transforms into meaningless data with observable existence, while steganography embeds the secret information inside an object (i.e. image, video, text, and audio) with invisible existence. …”
Get full text
Get full text
Get full text
Thesis -
5
-
6
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis
