Search Results - (( java implementation bat algorithm ) OR ( basic using encryption algorithm ))
Search alternatives:
- java implementation »
- implementation bat »
- bat algorithm »
- basic using »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…The hashed keyword will be used in encrypt / decrypt process by using any of 3 encryption algorithm mentioned before. …”
Get full text
Get full text
Thesis -
3
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
Get full text
Get full text
Thesis -
4
Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin
Published 2018“…In order to ensure the image data is secure/ protected and encryption time is low, it is very timely to conduct a research on image encryption and decryption using 3D-AES block cipher algorithm. …”
Get full text
Get full text
Thesis -
5
CHAOS BASED BLOCK ENCRYPTOR
Published 2008“…The coding of encryption and decryption algorithms is created using C language. …”
Get full text
Get full text
Final Year Project -
6
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…Basically it is used for message digest. One of the algorithms in hash function is RIPEMD-160. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
7
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…One such lightweight scheme is the AA-Beta (AAḃ) asymmetric cryptographic scheme whose algorithm consists of only basic arithmetic operations of addition and subtraction for both the encryption and decryption processes. …”
Get full text
Get full text
Thesis -
8
DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL
Published 2022“…Basically, it is used for message digest. RIPEMD-160 is one of the algorithms in hash function that can improve the security in storing information. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
9
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…Upon verification, a demonstration application prototype that performs RSA encryption and decryption is developed using Visual Basic 6.0. …”
Get full text
Get full text
Thesis -
10
Selective video encryption algorithm based on H.264/AVC and AES
Published 2011Get full text
Get full text
Get full text
Book Chapter -
11
Implementation of hashed cryptography algorithm based on cryptography message syntax
Published 2019“…This design and simulation research is conducted in CMC network security (message encryption context). The design will use MATLAB encryption to show simulation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Analysis randomness properties of basic components of SNOW 3G cipher in mobile systems
Published 2016“…SNOW 3G is a stream cipher algorithm used as encryption algorithm in third generation mobile phone technology (3G-UMTS). …”
Get full text
Get full text
Get full text
Article -
13
A secure message handler using microsoft cryptoapi
Published 2003“…This application demonstrates how to hash, encrypt and decrypt the string and various types of files using several cryptography algorithms provided by the CiyptoAPI function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
A secure message handler using microsoft cryptoapi
Published 2003“…This application demonstrates how to hash, encrypt and decrypt the string and various types of files using several cryptography algorithms provided by the CiyptoAPI function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi
Published 2023“…Our main objective is to compute encryption process and develop decryption schemes using Mellin Transformation and to modify the basic El Gamal system with the application of Mellin-Kamal Transformation. …”
Get full text
Get full text
Student Project -
16
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…There are many types of scheme used in encrypting a message so that it can be sent to a particular receiver from a particular sender without the third party knowing the content of the message known as cryptosystem. …”
Get full text
Get full text
Research Reports -
17
Extention and cryptanalysis of golden cryptography
Published 2015“…On the other hand, the encryption algorithm of GC is more suitable for textual data and cannot be directly applied to images. …”
Get full text
Get full text
Thesis -
18
Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs)
Published 2007“…Our work involves developing a prototype for Bluetooth systems using RSA and DSA encryption algorithms. An analysis was done to ascertain which of these algorithms is more suited to our proposed security framework and the results indicated that in most instances, the RS A performed better.…”
Get full text
Get full text
Get full text
Proceeding Paper -
19
A new 128-bit block cipher
Published 2009“…This block cipher uses 128-bit for the key length and block size. It is an involution substitution and permutation encryption network (SPN). …”
Get full text
Get full text
Thesis -
20
Stegano-image as a digital signature to improve security authentication system in mobile computing
Published 2016“…This type of textual password commonly follows an encryption algorithm to provide security. This techniques has some limitations and drawbacks. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
