Search Results - (( program _ bit algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- bit algorithm »
-
1
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…A 128-bit key requires 10 rounds where 192-bit and 256-bit requires 12 and 14 rounds respectively. …”
Get full text
Get full text
Thesis -
2
Optimization of Digital Electronic Circuit Structure Design Using Genetic Algorithm
Published 2008“…GALI is programmed by the success chromosome bits obtained from the simulation phase. …”
Get full text
Get full text
Thesis -
3
Security analysis of blowfish algorithm
Published 2013“…Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key lengths from 32 bits up to a maximum of 448 bits. …”
Get full text
Get full text
Conference or Workshop Item -
4
Encryption using FPGA
Published 2008“…The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits, this project implements the 128 bit standard on a Field Programming Gate Array (FPGA) using the VHDL, a hardware description language.…”
Get full text
Get full text
Undergraduates Project Papers -
5
Security analysis of blowfish algorithm
Published 2013“…Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key lengths from 32 bits up to a maximum of 448 bits.In order to measure the degree of security of blowfish algorithm, some cryptographic tests must be applied such as randomness test, avalanche criteria and correlation coefficient.In this paper we attempt to analyze the security of blowfish using avalanche criteria and correlation coefficient.We analyzed the randomness of the Blowfish output in an earlier paper titled “Randomness Analysis on Blowfish Block Cipher using ECB and CBC Modes”. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki
Published 2013Get full text
Get full text
Student Project -
7
Parallelization of speech compression based algorithm based on human auditory system on multicore system
Published 2012“…To achieve a scalable parallel speech coding algorithm, single program multiple data (SPMD) programming model was used, in which a single program was written for all cores. …”
Get full text
Get full text
Get full text
Article -
8
Design and implementation of real data fast fourier transform processor on field programmable gates array
Published 2015“…The radix-4 FFT algorithm will be implemented for 64 and 256 points using both 8-bit and 16-bit input width. …”
Get full text
Get full text
Thesis -
9
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Also, in our method, the key size is extended from 1024 bits to 2048 bits in length to provide a good level of security, since 1024 bits key size is no more appropraiate for protecting data. …”
Get full text
Get full text
Get full text
Article -
10
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004“…Besides that, Twofish also uses a 32 bit Pseudo Hadamard Transform to mix the outputs from its 2 parallel 32-bit g functions. …”
Get full text
Get full text
Final Year Project -
11
Data Hiding Techniques In Digital Images
Published 2003“…In this side, two programs had been implemented using MATLAB program to illustrate the main idea involved in least significant technique (low bit encoding), and the other to illustrate the masking technique inside the carrier image. …”
Get full text
Get full text
Thesis -
12
A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors
Published 2008“…One method is to increase the bit size of the microprocessor to 128/256/512 bits. …”
Get full text
Thesis -
13
Booth’s Algorithm Design Using Field Programmable Gate Array
Published 2014“…The high speed operation and less space and energy required had made the digital devices more preferred.This project is to design digital system which performed fixed point Booth Multiplier Algorithm where the design system would be developed using hardware description language (HDL),in this case,VHDL (VHSIC Hardware Description Language),VHSIC stands for Very High Speed Integrated Circuit.In this project would be used Xilinx ISE 10.1which is the software used to designed digital system for Xilinx manufactured FPGA board.In Xilinx have two main languages which are VHDL and Verilog.For design Booth’s Multiplier Algorithm we used Verilog code which is has to create the program module and test bench.In that case,to design digital system will have input and output which is input is 8 bits and output is 16 bits.Finally, it is proven that the system created can calculate and yield a fixed point multiplied output of the input value. …”
Get full text
Get full text
Get full text
Article -
14
Logic Algorithm for contour following task: An evaluation using Adept SCARA Robot
Published 2010“…This paper presents the performance evaluation of logic algorithms for contourfollowing task in order to automate the manual programming process. …”
Get full text
Get full text
Article -
15
Optimization Of Twofish Encryption Algorithm On FPGA
Published 2005“…Besides that, Twofish also uses a 32 bit Pseudo Hadamard Transform to mix the outputs from its 2 parallel 32-bit g functions. …”
Get full text
Conference or Workshop Item -
16
-
17
Error correction for CDMA code in mobile communication
Published 2023“…A simulation program is developed to study the performance of error correction by studying the BER of the received information bits. � 2003 IEEE.…”
Conference paper -
18
Hardware Acceleration of Window Big-Digit (Wbd) Multiplication for Embedded Applications
Published 2015“…The accelerator is equipped with AXI interface and integrated into an ARM-based SoC system for benchmarking purpose. The test programs are The hardware-accelerated 256-bits multiplication is found that to be 340 fold faster than pure software implementation of classical multiplication. …”
Get full text
Get full text
Thesis -
19
Security mechanism for wireless Mobile Ad Hoc Networks (MANET)
Published 2006“…These algorithms are chosen because they are suitable for low bit rate data. …”
Get full text
Get full text
Student Project -
20
Optimized fast fourier transform architecture using instruction set architecture extension in low-end digital signal controller
Published 2018“…Compared to the initial processor architecture, the support of extended ISA has increased the UTeMRISC core by 21.8% but at the same time allows to execute Fast Fourier Transform algorithm up to 5× faster. The combine effort of ISA extension and optimized instruction set generation results in up to 1 Mega sample per second, which translated to 66.8% increase of data throughput in the FFT algorithm when compared to a 32-bit architecture. …”
Get full text
Get full text
Get full text
Thesis
