Search Results - (( problems a encryption algorithm ) OR ( java simulation optimization algorithm ))
Search alternatives:
- java simulation »
- a encryption »
- problems a »
-
1
On the Computational Cost of Cocks’ Identity Based Encryption
Published 2018“…The algorithms in Cocks’ Identity Based Encryption consists of four stages: Setup, Extract, Encrypt and Decrypt. …”
Get full text
Get full text
Article -
2
Cryptography: A New Approach of Classical Hill Cipher
Published 2013“…A random matrix key is introduced as an extra key for encryption. …”
Get full text
Get full text
Article -
3
A new image encryption algorithm based on single S-box and dynamic encryption step
Published 2021“…Secondly, a new dynamic encryption step method is proposed to solve the high correlation and deterministic problems in multiple S-box encryptions. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Experiment -
4
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…Besides, the encryption speed of these algorithms is too slow and it can only encrypt a small size data. …”
Get full text
Get full text
Conference or Workshop Item -
5
Modification of text encryption based on Elliptic Curve Cryptography (ECC) and Cayley-Purser Algorithm / Nurul Sakinah Ismail
Published 2019“…Therefore, one of the strategy to surmount this situation is by designing a scheme with multiple hard problems. Motivated from that, this study reviewed the arithmetical properties of elliptic curve and Cayley purser algorithm. …”
Get full text
Get full text
Student Project -
6
Performance evaluation for different data encryption algorithms on wireless sensor network (WSN)
Published 2018“…The SF algorithm presented a good permanence with execution time (s) needed 0.006971s to encrypt the images before transmitted to the receiver station.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
A New Hybrid Image Encryption Technique Using Lorenz Chaotic System and Simulated Kalman Filter (SKF) Algorithm
Published 2022“…A new hybrid technique, Lorenz chaotic system and an optimization algorithm, Simulated Kalman Filter (SKF) had been proposed to solve image encryption problem. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari
Published 2014“…However, AES users or application that using AES algorithm might face the problem of computational overhead. …”
Get full text
Get full text
Thesis -
9
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…The deployment of network security procedures requires the implementation of Cryptographic algorithms. To facilitate this security issue, it is best to define a problem and advice a solution. …”
Get full text
Get full text
Thesis -
10
-
11
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006“…In this project, the Blowfish encryption algorithm is chosen because it is among the safest algorithm used nowadays. …”
Get full text
Get full text
Monograph -
12
A DNA-dynamic permutation-diffusion algorithm for image encryption using scaling chaotification models and advanced DNA operations
Published 2025“…As a result, the proposed system establishes a new benchmark for secure and efficient image encryption against cyber threats.…”
Get full text
Get full text
Get full text
Get full text
Article -
13
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…Lastly, a new hybrid technique suggests tackling the current image encryption application problem by using the estimated parameters of chaotic systems with an optimization algorithm, the SKF algorithm. …”
Get full text
Get full text
Thesis -
14
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…To improve secure of data in cloud storage by hybrid three algorithms (AES, ECC and RSA).All the existing algorithms has some sort of problems and issues, this had made us decide to develop a safe, correct ad efficient algorithm for having secured data in cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
15
An overview of video encryption techniques
Published 2010“…A trade-off between quality of video streaming and choice of encryption algorithm were shown. …”
Get full text
Get full text
Get full text
Article -
16
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
Get full text
Get full text
Conference or Workshop Item -
17
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…In this paper, a comparative study is done between the two security algorithms on a cloud platform called eyeOS. …”
Article -
18
An improved chaotic image encryption algorithm
Published 2018“…Chaotic-based image encryption algorithms are countless in number. Encryption techniques based on Chaos are among the most effectual algorithms for encryption of data image. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
20
A hybrid method for data communication using encrypted audio steganography
Published 2024journal::journal article
