Search Results - (( structures based encryption algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    A shift column different offset for better Rijndael security by Mahmod, Ramlan, Ali, Sherif Abdulbari, Abd Ghani, Abdul Azim

    Published 2009
    “…The security of the algorithm on the other hand, is based on the randomness of the output from the encryption process. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    An enhanced color image encryption algorithm using LT-PRNG by Mohammed Ismael, Saba

    Published 2018
    “…The image encryption algorithm depends on the Fridrich encryption model; thus, an enhancement of this structure is proposed. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Security enhancement of digital motion image transmission using hybrid AES-DES algorithm by Vishnu M.B., Tiong S.K., Zaini M., Koh S.P.

    Published 2023
    “…This paper outlines the possible weaknesses within the current AES encryption algorithm especially against algebraic based cryptanalysis. …”
    Conference paper
  5. 5
  6. 6

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…The proposed model is able to protect the DNA sequence stored in the Fog Computing cloud from plain text attacks by generating (I) the main key, which is the key to the EAES encryption algorithm, (II) the rule 1 key, which represents the DNA base number of possible key probabilities, and (III) the rule 2 key, which represents the number of binding probabilities for the DNA helical structure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Efficient dynamic DNA-based block cipher algorithm by Chng, Chern Wei

    Published 2023
    “…It generates encrypted random numbers for the encryption process. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Synonym based malay linguistic text steganography by Muhammad H.Z., Shakil A., Syed Ahmad Abdul Rahman S.M.

    Published 2023
    “…This paper describes in detail the steganography algorithm that involves the encryption and decryption processes, its advantages and limitations. � 2009 IEEE.…”
    Conference paper
  9. 9

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    An immune system-inspired byte permutation function to improve confusion performance of round transformation in symmetric encryption scheme. by Ariffin, Suriyani, Mahmod, Ramlan, Jaafar, Azmi, Rezal, Muhammad, Ariffin, Kamel

    Published 2012
    “…In data encryption, the security of the algorithm is measured based on Shannon’s confusion and diffusion properties. …”
    Get full text
    Book Section
  11. 11
  12. 12

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff by Fatin Nabila , Abd Latiff

    Published 2021
    “…In this thesis, the second part of chaos-based secure communication is introducing a new encryption algorithm to improve the security of modern chaos-based communication systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Performance analysis and improvement of rabin primitive based cryptosystems by Mahad, Zahari

    Published 2014
    “…Finally, we amend the Rabin cryptosystem utilizing the encryption strategy of the AAβ algorithm and run experiments to gauge its efficiency.…”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  17. 17

    Designing new chaotic and hyperchaotic systems for chaos-based cryptography by Kadhim, Al Karawi Hayder Natiq

    Published 2019
    “…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. …”
    Get full text
    Get full text
    Thesis
  18. 18

    The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem by Wong, Tze Jin

    Published 2006
    “…We define the cyclic structure for every types. Then, we can generate the Euler totient function from the cyclic structure of every types of the quartic polynomial.We have some properties of the sequence which are straightforward consequences of the definition. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers