Search Results - (( structures based encryption algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- java application »
- structures »
-
1
A shift column different offset for better Rijndael security
Published 2009“…The security of the algorithm on the other hand, is based on the randomness of the output from the encryption process. …”
Get full text
Get full text
Get full text
Article -
2
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…The image encryption algorithm depends on the Fridrich encryption model; thus, an enhancement of this structure is proposed. …”
Get full text
Get full text
Thesis -
3
Enhancing Cryptographic Resilience through Symmetric Encryption Algorithm Utilizing Variable Length Chromosomes Genetic Algorithm
Published 2026journal::journal article -
4
Security enhancement of digital motion image transmission using hybrid AES-DES algorithm
Published 2023“…This paper outlines the possible weaknesses within the current AES encryption algorithm especially against algebraic based cryptanalysis. …”
Conference paper -
5
DNA sequences compression by GP2R and selective encryption using modified RSA technique
Published 2020“…The proposed algorithm is a new Lossless Compression algorithm, which compresses data, based on two tiers. …”
Get full text
Get full text
Get full text
Article -
6
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…The proposed model is able to protect the DNA sequence stored in the Fog Computing cloud from plain text attacks by generating (I) the main key, which is the key to the EAES encryption algorithm, (II) the rule 1 key, which represents the DNA base number of possible key probabilities, and (III) the rule 2 key, which represents the number of binding probabilities for the DNA helical structure. …”
Get full text
Get full text
Get full text
Thesis -
7
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…It generates encrypted random numbers for the encryption process. …”
Get full text
Get full text
Thesis -
8
Synonym based malay linguistic text steganography
Published 2023“…This paper describes in detail the steganography algorithm that involves the encryption and decryption processes, its advantages and limitations. � 2009 IEEE.…”
Conference paper -
9
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
10
An immune system-inspired byte permutation function to improve confusion performance of round transformation in symmetric encryption scheme.
Published 2012“…In data encryption, the security of the algorithm is measured based on Shannon’s confusion and diffusion properties. …”
Get full text
Book Section -
11
-
12
A block cipher based on genetic algorithm
Published 2016“…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
Get full text
Get full text
Get full text
Thesis -
13
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
Published 2021“…In this thesis, the second part of chaos-based secure communication is introducing a new encryption algorithm to improve the security of modern chaos-based communication systems. …”
Get full text
Get full text
Get full text
Thesis -
14
Performance analysis and improvement of rabin primitive based cryptosystems
Published 2014“…Finally, we amend the Rabin cryptosystem utilizing the encryption strategy of the AAβ algorithm and run experiments to gauge its efficiency.…”
Get full text
Get full text
Get full text
Thesis -
15
-
16
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
17
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
Published 2019“…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. …”
Get full text
Get full text
Thesis -
18
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
Published 2006“…We define the cyclic structure for every types. Then, we can generate the Euler totient function from the cyclic structure of every types of the quartic polynomial.We have some properties of the sequence which are straightforward consequences of the definition. …”
Get full text
Get full text
Thesis -
19
-
20
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers
