Search Results - (( java application interface algorithm ) OR ( using iterative encryption algorithm ))
Search alternatives:
- iterative encryption »
- java application »
- using iterative »
-
1
DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL
Published 2022“…This security algorithm was examined and put into use in this project using an iterative methodology. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
2
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…The RIPEMD-160 can improve the security in storing information. This project used iterative method to investigate the security algorithm and implemented the algorithm. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
3
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003“…The paper also includes an example of image encryption. From the analysis done, it shows that the security level is high even though keys that are found to be weak keys for Baker’s map algorithm are being used in the algorithm. …”
Get full text
Get full text
Article -
4
A new public key cryptosystem based on IFS
Published 2010“…In the proposed public-key encryption algorithm, generate iterated function systems as a global public element, then its Hutchinson operator is used as a public key. …”
Get full text
Get full text
Get full text
Article -
5
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…AES in this research was implemented using 128- bit of key length and block size. The overall transformation encryption process consist of iterative steps called rounds. …”
Get full text
Get full text
Thesis -
6
Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
Published 2013“…Also the parallel AES-XTS encryption and decryption design were used to develop integrated chip of AES-XTS on FPGA. …”
Get full text
Get full text
Thesis -
7
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
Published 2014“…This recommended encryption algorithm also overcomes the flaw in Ariffin’s encryption procedure. …”
Get full text
Get full text
Get full text
Thesis -
8
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Article -
9
An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box
Published 2014“…The Blowfish Algorithm (BA) is a symmetric block cipher that uses Feistel network to iterate simple encryption and decryption functions. …”
Get full text
Get full text
Get full text
Thesis -
10
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Secure block cipher inspired by the human immune system
Published 2012“…In computer security service, cryptographic algorithm is used to ensure adequate security of the systems or of data transfers. …”
Get full text
Get full text
Thesis -
13
Application-Programming Interface (API) for Song Recognition Systems
Published 2024“…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
Article -
14
A cylindrical coordinate system with dynamic permutation table for blowfish algorithm
Published 2014“…The Blowfish Algorithm (BA) is a symmetric block cipher that iterates simple encryption and decryption functions by using Feistel networks.BA keys vary from 32-448 bits to ensure a high level of security.However, the BA requires a high memory percentage and it has a problem regarding randomness of output with text and image files having large strings of identical bytes.One solution to the seissues is to design a new Cryptography algorithm based on the BA that incorporates an F-function into a Cylindrical Coordinate System (CCS).The resulting F-function is known as a CCS with a Dynamic Permutation Table (DPT) or CCSDPT whereas the new algorithm is called the New BA (NBA).The objectives of the CCSDPT are to reduce memory requirements, enhance the randomness of the output and increase resistance to attacks through byte relocation and transformation in the right cylinder.NBA is evaluated by investigates the output of the algorithm by using statistical tests from the National Institute of Standard and Technology (NIST) with five types of data and compared with the BA.The findings of the NIST tests show that the NBA is suitable for any data stream, even those with long strings of identical bytes. …”
Get full text
Get full text
Get full text
Article -
15
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022Get full text
Get full text
Monograph -
17
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
18
Efficiency analysis for public key systems based on fractal functions.
Published 2011“…In this study we propose a new public key cryptosystem based on Iterated Function Systems (IFS). Results: In the proposed protocol, the attractor of the IFS is used to obtain public key from private one, which is then used with the attractor again to encrypt and decrypt the messages. …”
Get full text
Get full text
Get full text
Article -
19
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
20
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers
