Search Results - (( from implementation encryption algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implementation encryption »
- from implementation »
- implication based »
- java implication »
-
1
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010“…As a conclusion, Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better.…”
Get full text
Get full text
Undergraduates Project Papers -
2
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010“…This method is names after Julius Caesar who using this method to communicate with his generals.The result from this project is a data which is encrypted and be decrypted to its readable form.As a conclusion,Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better.…”
Get full text
Get full text
Undergraduates Project Papers -
3
Implementation of a parallel XTS encryption mode of operation
Published 2014“…In these simulations, AES is used as encryption algorithm with 256-bit encryption key.…”
Get full text
Get full text
Get full text
Article -
4
Performance comparison encryption of IPSEC VPN encryption techniques / Nur Hasyimah Mohd Ridzuan
Published 2015“…By varying the combination of encryption algorithm 3DES and AES 256 with two hashing type SHA-1 and MD5, the performance of each algorithm was compared and analyzed via Window 7 environment. …”
Get full text
Get full text
Thesis -
5
Performance comparison of encryption IPsec VPN encryption techniques / Nur Hasyimah Mohd Ridzuan and Ruhani Ab Rahman
“…By varying the combination of encryption algorithm 3DES and AES 256 with two hashing type SHA-1 and MD5, the performance of each algorithm was compared and analyzed via Window 7 environment. …”
Get full text
Get full text
Article -
6
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…Both old and new implementations are used to encrypt and decrypt different sizes and types of files using different generated key sizes. …”
Get full text
Get full text
Thesis -
7
Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari
Published 2014“…Therefore, hopefully in future, any cryptography developers can implement this code if they want to encrypt the complex data. …”
Get full text
Get full text
Thesis -
8
Effect of file sizes on encryption and decryption in constrained devices / Nurnadia Sapri
Published 2015“…Therefore, AES-128 gives higher confidentiality compared to RSA-2048 and it will be most suitable encryption algorithm to be implemented in the TCP protocol.…”
Get full text
Get full text
Thesis -
9
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…However, computer networks have a lot of vulnerabilities and threats. Previously, many encryption algorithms have been investigated. The Cryptography Algorithm is used to protect data through encryption that allows sensitive information to be passed through the network safely. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
10
Audio encryption and decryption using 3D AES block cipher algorithm / Nur Fattin Nadhrah Saifuddin
Published 2018“…In other and, ADDIE model is a methodology that including analysis, design, development, implementation and evaluation that complete the cycle of the project that starts from get the title of project, survey and collect the information about encryption and decryption, and specify the scope to 3D AES block cipher algorithm.…”
Get full text
Get full text
Thesis -
11
Cyber Threat Extenuation for Substation Data Communication: Evaluation of Encrypt-Authenticator Prototype for IEC 60870-5 Data
Published 2023Conference Paper -
12
The Performance of the 3DES and Fernet Encryption in Securing Data Files
Published 2024journal::journal article -
13
A modified approach to improve the performance of AES using feistel structure
Published 2018“…In encryption algorithm design, apart from the security performance, processing performance and the cost of the implementation are very important trade-off parameters. …”
Get full text
Get full text
Thesis -
14
Cryptography: A New Approach of Classical Hill Cipher
Published 2013“…Apart from this, the encryption quality of the proposed algorithm is also measured by using the maximum deviation and correlation coefficient factors. …”
Get full text
Get full text
Article -
15
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…AES is the next generation encryption algorithm replacing the older version which is DES and Triple DES. …”
Get full text
Get full text
Thesis -
16
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
17
Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment
Published 2024“…Data encryption is one of the most implemented cybersecurity solutions as it provide data protection from being stolen by unauthorized parties. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
-
19
The performance of the 3DES and Fernet encryption in securing data files
Published 2024“…Therefore, this study aims to implement the symmetric encryption algorithms known as 3DES and Fernet methods as a means for securing files. …”
Get full text
Article -
20
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
Get full text
Get full text
Conference or Workshop Item
