Search Results - (( from implementation encryption algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Implementation of hybrid encryption method using caesar cipher algorithm by Tat Wi, Charomie

    Published 2010
    “…As a conclusion, Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Implementation of hybrid encryption method using caesar cipher algorithm by Charomie, Tat Wi

    Published 2010
    “…This method is names after Julius Caesar who using this method to communicate with his generals.The result from this project is a data which is encrypted and be decrypted to its readable form.As a conclusion,Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Implementation of a parallel XTS encryption mode of operation by Alomari, Mohammad Ahmed, Samsudin, Khairulmizam, Ramli, Abdul Rahman

    Published 2014
    “…In these simulations, AES is used as encryption algorithm with 256-bit encryption key.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Performance comparison encryption of IPSEC VPN encryption techniques / Nur Hasyimah Mohd Ridzuan by Mohd Ridzuan, Nur Hasyimah

    Published 2015
    “…By varying the combination of encryption algorithm 3DES and AES 256 with two hashing type SHA-1 and MD5, the performance of each algorithm was compared and analyzed via Window 7 environment. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Performance comparison of encryption IPsec VPN encryption techniques / Nur Hasyimah Mohd Ridzuan and Ruhani Ab Rahman by Mohd Ridzuan, Nur Hasyimah, Ab Rahman, Ruhani

    “…By varying the combination of encryption algorithm 3DES and AES 256 with two hashing type SHA-1 and MD5, the performance of each algorithm was compared and analyzed via Window 7 environment. …”
    Get full text
    Get full text
    Article
  6. 6

    Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security by H. Belgassem, Seddeq

    Published 2004
    “…Both old and new implementations are used to encrypt and decrypt different sizes and types of files using different generated key sizes. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari by Mohammad Zahari, Mohamad Zakirin

    Published 2014
    “…Therefore, hopefully in future, any cryptography developers can implement this code if they want to encrypt the complex data. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Effect of file sizes on encryption and decryption in constrained devices / Nurnadia Sapri by Sapri, Nurnadia

    Published 2015
    “…Therefore, AES-128 gives higher confidentiality compared to RSA-2048 and it will be most suitable encryption algorithm to be implemented in the TCP protocol.…”
    Get full text
    Get full text
    Thesis
  9. 9

    DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE by FLORISCA, ALDINA GODULUS

    Published 2019
    “…However, computer networks have a lot of vulnerabilities and threats. Previously, many encryption algorithms have been investigated. The Cryptography Algorithm is used to protect data through encryption that allows sensitive information to be passed through the network safely. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  10. 10

    Audio encryption and decryption using 3D AES block cipher algorithm / Nur Fattin Nadhrah Saifuddin by Saifuddin, Nur Fattin Nadhrah

    Published 2018
    “…In other and, ADDIE model is a methodology that including analysis, design, development, implementation and evaluation that complete the cycle of the project that starts from get the title of project, survey and collect the information about encryption and decryption, and specify the scope to 3D AES block cipher algorithm.…”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    A modified approach to improve the performance of AES using feistel structure by Al-Ansi, Afeef Yahya Ahmed

    Published 2018
    “…In encryption algorithm design, apart from the security performance, processing performance and the cost of the implementation are very important trade-off parameters. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Cryptography: A New Approach of Classical Hill Cipher by Abdul Rahman, Mohd Nordin, Yusof, Mohd Kamir, Abidin @ Bharun, Ahmad Faisal Amri, Mohamad Usop, Nor Surayati

    Published 2013
    “…Apart from this, the encryption quality of the proposed algorithm is also measured by using the maximum deviation and correlation coefficient factors. …”
    Get full text
    Get full text
    Article
  15. 15

    Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari by Nazari, Khairul Nashran

    Published 2017
    “…AES is the next generation encryption algorithm replacing the older version which is DES and Triple DES. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Implementation of Grid Computing for Cryptosystem (RSA) by Abd Wahab, Mohamed Ferdaus

    Published 2005
    “…The RSA algorithm can be used for both public key encryption and digital signatures. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment by Khalifa, Othman Omran, Ahmed, Muhammed Zaharadeen, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…Data encryption is one of the most implemented cybersecurity solutions as it provide data protection from being stolen by unauthorized parties. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18
  19. 19

    The performance of the 3DES and Fernet encryption in securing data files by Mohd, Siti Munirah, Kamarudin, Shafinah, Yahya, Norhanizah, Hasan, Sazlinah, Mahamad Zakaria, Muhammad Luqman, Sulaiman, Sahimel Azwal, Setyohadi, Djoko Budiyanto

    Published 2024
    “…Therefore, this study aims to implement the symmetric encryption algorithms known as 3DES and Fernet methods as a means for securing files. …”
    Get full text
    Article
  20. 20

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
    Get full text
    Get full text
    Conference or Workshop Item