Search Results - (( java application optimized algorithm ) OR ( using simple encryption algorithm ))
Search alternatives:
- optimized algorithm »
- simple encryption »
- java application »
-
1
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…Several chaos-based image encryption algorithms use low-dimension chaos as the encryption tools. …”
Get full text
Get full text
Thesis -
2
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
Get full text
Get full text
Monograph -
3
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
Get full text
Get full text
Thesis -
4
Secret channel using video steganography
Published 2017“…OurSecret software only using simple password to keep the secrecy of the message. …”
Get full text
Get full text
Get full text
Article -
5
A shift column different offset for better Rijndael security
Published 2009“…Rijndael, currently the Advanced Encryption Standard Algorithms (AES) is a block cipher uses a 128, 192, or 256-bit key length to encrypt 128-bit blocks of plaintext. …”
Get full text
Get full text
Get full text
Article -
6
Improving The Randomness of Output Sequence for The Advanced Encryption Standard Cryptographic Algorithm
Published 2005“…Rijndael, the Advanced Encryption Standard (AES) is an encryption standard uses ByteSub, Shiftrow, Mixcolumn and KeyExpansion functions which are the principle of generating a random and pseudorandom numbers. …”
Get full text
Get full text
Thesis -
7
Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm
Published 2023“…The proposed cryptosystem utilized two algorithms: a dynamic variant of the Advanced Encryption Standard (D-AES) and Key policy attribute base encryption (KP-ABE). …”
Get full text
Get full text
Thesis -
8
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Thus, it is suitable for mobile devices, it uses 160 bits key and provides the same security as RSA 1024 bits key.Some benefits are expected from this study to improve the encryption algorithm for mobile security.…”
Get full text
Get full text
Conference or Workshop Item -
9
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…The proposed solution consists of a simple, but strong encryption/decryption algorithm as well as an embedded method to exchange the keys between the users. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
A novel approach to signal encryption: improved version of conventional DSSS scheme
Published 2011“…In this proposal; an audio signal is suggested to be encrypted using sample by sample method instead of bit by bit encryption of direct sequence spread spectrum_ After sampling of a signal, simple mathematical operation is performed in each sample with a time varying arbitrary weights. …”
Get full text
Get full text
Article -
11
A Novel Approach to Signal Encryption: Improved Version of Conventional DSSS Scheme
Published 2011“…In this proposal; an audio signal is suggested to be encrypted using sample by sample method instead of bit by bit encryption of direct sequence spread spectrum_ After sampling of a signal, simple mathematical operation is performed in each sample with a time varying arbitrary weights. …”
Get full text
Get full text
Article -
12
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
Published 2006“…In this paper CSA is used to cryptanalyse a simple substitution cipher, whereby the key used to encrypt the plaintext is searched. …”
Get full text
Get full text
Conference or Workshop Item -
13
Selective video encryption algorithm based on H.264/AVC and AES
Published 2011Get full text
Get full text
Get full text
Book Chapter -
14
A chaotic neural network based encryption algorithm for MPEG-2 encoded video signal
Published 2012Get full text
Working Paper -
15
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
16
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
17
Image steganography for encryption over network security
Published 2017“…The image steganography for encryption is simple to implement and the selections of image is important to achieve the objective of image steganography. …”
Get full text
Get full text
Student Project -
18
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
19
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. …”
Get full text
Get full text
Get full text
Article -
20
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. …”
Get full text
Get full text
Get full text
Article
