Search Results - (( java application customization algorithm ) OR ( using linear encryption algorithm ))
Search alternatives:
-
1
Implementation of a parallel XTS encryption mode of operation
Published 2014“…In these simulations, AES is used as encryption algorithm with 256-bit encryption key.…”
Get full text
Get full text
Get full text
Article -
2
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…The use of non-linear S-Box is essential in preventing linear approximations that could lead to successful attacks, such as differential cryptanalysis. …”
Get full text
Get full text
Thesis -
3
Audio encryption and decryption using 3D AES block cipher algorithm / Nur Fattin Nadhrah Saifuddin
Published 2018“…This project purpose is to identify the implementation testing security using 3D AES block cipher algorithm. Besides, this encryption using audio as a data in order to design and develop the project. …”
Get full text
Get full text
Thesis -
4
Enhancing Cryptographic Resilience through Symmetric Encryption Algorithm Utilizing Variable Length Chromosomes Genetic Algorithm
Published 2026journal::journal article -
5
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…The performance analysis in terms of processing speed of the encryption and decryption process of the DDBC algorithm shows minimal differences in both AES and DDBC algorithm despite of the difference method of transformation used in both algorithms. …”
Get full text
Get full text
Thesis -
6
Partial encryption of compressed images employing FPGA
Published 2005“…A secure encryption algorithm is then used to encrypt only the crucial parts, which are considerably smaller than the original image. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
A performance improvement of Domosi’s cryptosystem
Published 2015“…In this research, we propose a modified encryption algorithm to improve performance of the system up to a better linear-time without effecting its security. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
Design and Implementation of a Genetic Algorithm-Based Block Cipher For Enhanced Cryptographic Security
Published 2025conference output::conference proceedings::conference paper -
9
Secure block cipher inspired by the human immune system
Published 2012“…It also measures the diffusion property in linear transformation using branch number in estimating the possible success of differential and linear attacks. …”
Get full text
Get full text
Thesis -
10
Chaos-based simultaneous compression and encryption for Hadoop
Published 2017“…In addition, the proposed approach implements a masking pseudorandom keystream that enhances encryption quality. The proposed algorithm demonstrated a congruent fit within the Hadoop framework, providing robust encryption security and compression. © 2017 Usama, Zakaria. …”
Get full text
Get full text
Article -
11
A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP)
Published 2018“…Therefore, this paper reports a systematic design methodology to generate chaotic S-box utilizing DDT and that can be used in multimedia encryption algorithms. DDT within the design loop is used to optimize differential approximation probability. …”
Get full text
Get full text
Article -
12
A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP)
Published 2018“…Therefore, this paper reports a systematic design methodology to generate chaotic S-box utilizing DDT and that can be used in multimedia encryption algorithms. DDT within the design loop is used to optimize differential approximation probability. …”
Get full text
Get full text
Article -
13
Lao-3d: A Symmetric Lightweight Block Cipher Based on 3d Permutation for Mobile Encryption Application
Published 2024journal::journal article -
14
Randomized text encryption: a new dimension in cryptography
Published 2014“…The proposed technique uses random numbers added to plaintext along with encryption key. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
A performance improvement of Dömösi’s cryptosystem
Published 2016“…In this research, we propose a modified encryption algorithm to improve performance of the system up to a better linear-time without effecting its security.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
A block cipher based on genetic algorithm
Published 2016“…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
Get full text
Get full text
Get full text
Thesis -
17
Cryptographic Algorithm Using Matrix Inversion as Data Protection
Published 2011Get full text
Get full text
Get full text
Article -
18
An immune system-inspired byte permutation function to improve confusion performance of round transformation in symmetric encryption scheme.
Published 2012“…In data encryption, the security of the algorithm is measured based on Shannon’s confusion and diffusion properties. …”
Get full text
Book Section -
19
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…Most research in the literature used fixed key expansion algorithm for encryption and decryption. …”
Get full text
Get full text
Thesis -
20
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article
