Search Results - (( programme based encryption algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- programme based »
-
1
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…The hardware based of encryption chip become realizable with Field Programmable Gate Arrays (FPGAs). …”
Get full text
Get full text
Monograph -
2
-
3
Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
Published 2013“…For an effective storage encryption implementation, two well known methods are software based encryption and hardware based encryption. …”
Get full text
Get full text
Thesis -
4
The memory-less method of generating multiplicative inverse values for S-box in AES algorithm
Published 2009Get full text
Working Paper -
5
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
8
NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases
Published 2022“…This method utilizes the Asymmetric encryption algorithm, RSA in particular. Using this method, key pairs are generated and exchanged during the design. …”
Get full text
Get full text
Conference or Workshop Item -
9
NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases
Published 2022“…This method utilizes the Asymmetric encryption algorithm, RSA in particular. Using this method, key pairs are generated and exchanged during the design. …”
Get full text
Get full text
Conference or Workshop Item -
10
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
