Search Results - (( java simulation optimization algorithm ) OR ( using linear encryption algorithm ))
Search alternatives:
-
1
Implementation of a parallel XTS encryption mode of operation
Published 2014“…In these simulations, AES is used as encryption algorithm with 256-bit encryption key.…”
Get full text
Get full text
Get full text
Article -
2
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…The use of non-linear S-Box is essential in preventing linear approximations that could lead to successful attacks, such as differential cryptanalysis. …”
Get full text
Get full text
Thesis -
3
Audio encryption and decryption using 3D AES block cipher algorithm / Nur Fattin Nadhrah Saifuddin
Published 2018“…This project purpose is to identify the implementation testing security using 3D AES block cipher algorithm. Besides, this encryption using audio as a data in order to design and develop the project. …”
Get full text
Get full text
Thesis -
4
Enhancing Cryptographic Resilience through Symmetric Encryption Algorithm Utilizing Variable Length Chromosomes Genetic Algorithm
Published 2026journal::journal article -
5
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…The performance analysis in terms of processing speed of the encryption and decryption process of the DDBC algorithm shows minimal differences in both AES and DDBC algorithm despite of the difference method of transformation used in both algorithms. …”
Get full text
Get full text
Thesis -
6
Partial encryption of compressed images employing FPGA
Published 2005“…A secure encryption algorithm is then used to encrypt only the crucial parts, which are considerably smaller than the original image. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
A performance improvement of Domosi’s cryptosystem
Published 2015“…In this research, we propose a modified encryption algorithm to improve performance of the system up to a better linear-time without effecting its security. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
Design and Implementation of a Genetic Algorithm-Based Block Cipher For Enhanced Cryptographic Security
Published 2025conference output::conference proceedings::conference paper -
9
Secure block cipher inspired by the human immune system
Published 2012“…It also measures the diffusion property in linear transformation using branch number in estimating the possible success of differential and linear attacks. …”
Get full text
Get full text
Thesis -
10
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
11
Chaos-based simultaneous compression and encryption for Hadoop
Published 2017“…In addition, the proposed approach implements a masking pseudorandom keystream that enhances encryption quality. The proposed algorithm demonstrated a congruent fit within the Hadoop framework, providing robust encryption security and compression. © 2017 Usama, Zakaria. …”
Get full text
Get full text
Article -
12
A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP)
Published 2018“…Therefore, this paper reports a systematic design methodology to generate chaotic S-box utilizing DDT and that can be used in multimedia encryption algorithms. DDT within the design loop is used to optimize differential approximation probability. …”
Get full text
Get full text
Article -
13
A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP)
Published 2018“…Therefore, this paper reports a systematic design methodology to generate chaotic S-box utilizing DDT and that can be used in multimedia encryption algorithms. DDT within the design loop is used to optimize differential approximation probability. …”
Get full text
Get full text
Article -
14
Lao-3d: A Symmetric Lightweight Block Cipher Based on 3d Permutation for Mobile Encryption Application
Published 2024journal::journal article -
15
Randomized text encryption: a new dimension in cryptography
Published 2014“…The proposed technique uses random numbers added to plaintext along with encryption key. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
A performance improvement of Dömösi’s cryptosystem
Published 2016“…In this research, we propose a modified encryption algorithm to improve performance of the system up to a better linear-time without effecting its security.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
A block cipher based on genetic algorithm
Published 2016“…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
Get full text
Get full text
Get full text
Thesis -
18
Cryptographic Algorithm Using Matrix Inversion as Data Protection
Published 2011Get full text
Get full text
Get full text
Article -
19
An immune system-inspired byte permutation function to improve confusion performance of round transformation in symmetric encryption scheme.
Published 2012“…In data encryption, the security of the algorithm is measured based on Shannon’s confusion and diffusion properties. …”
Get full text
Book Section -
20
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis
