Search Results - (( using factor method algorithm ) OR ( based encryption method algorithm ))
Search alternatives:
- encryption method »
- method algorithm »
- using factor »
-
1
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006“…However, until now, the cryptography hardware is still not commonly used especially in FPGA. In this project, the Blowfish encryption algorithm is chosen because it is among the safest algorithm used nowadays. …”
Get full text
Get full text
Monograph -
2
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
Published 2023“…A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. …”
Book Chapter -
3
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…Additionally, a DNA-based ShiftRow function was proposed to enhance the execution of permutation by methodically displacing the rows of the state array using different offset values. …”
Get full text
Get full text
Thesis -
4
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…This report explains the project of developing Parallel Processing of RSA Algorithm Using MPI Library. RSA Algorithm is a public-key cryptosystem that offers encryption technique which security is based on the difficulty of factoring large prime integers. …”
Get full text
Get full text
Final Year Project -
5
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…It will include the coding of python programming coding and calculation of proposed method. The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
Get full text
Get full text
Student Project -
6
Breaking A Playfair Cipher Using Single and Multipoints Crossover Based on Heuristic Algorithms
Published 2023Conference Paper -
7
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…The proposed authentication method, uses an enhanced method where the credentials are encrypted through an algorithm. …”
Get full text
Get full text
Get full text
Thesis -
8
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The evaluation of the security of the proposed scheme is based on SVO logic to verify the security of the informal method. …”
Get full text
Get full text
Thesis -
9
High-Throughput of SHA-256 Hash Function with Unfolding Transformation
Published 2019“…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
Get full text
Get full text
Proceeding -
10
High-Throughput of SHA-256 Hash Function with Unfolding Transformation
Published 2019“…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
Get full text
Get full text
Proceeding -
11
-
12
Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation
Published 2022“…The algorithms are successfully designed using the Altera Quartus II platform. …”
Get full text
Get full text
Get full text
Proceeding -
13
High-Throughput of SHA-256 Hash Function with Unfolding Transformation
Published 2019“…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
Get full text
Get full text
Get full text
Article -
14
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
Published 2015“…Rabin cryptosystem has fast encryption and proven as secure as the integer factorization problem. …”
Get full text
Get full text
Thesis -
15
Performance analysis and improvement of rabin primitive based cryptosystems
Published 2014“…Finally, we amend the Rabin cryptosystem utilizing the encryption strategy of the AAβ algorithm and run experiments to gauge its efficiency.…”
Get full text
Get full text
Get full text
Thesis -
16
High-Throughput of SHA-256 Hash Function with Unfolding Transformation
Published 2019“…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
Get full text
Get full text
Get full text
Article -
17
Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari
Published 2014“…Nowadays, there are a lot of cryptography method has been applied. One of the most popular cryptography methods is Advance Encryption Standard (AES). …”
Get full text
Get full text
Thesis -
18
Fast recovery of unknown coefficients in DCT-transformed images
Published 2017“…Our experimental results showed that, for 100 test images of different sizes and using a naive image segmentation method based on Otsu's thresholding algorithm, the proposed method is faster for more than 92% cases and the maximum improvement observed is more than 19 times faster. …”
Get full text
Get full text
Article -
19
An improved chaotic image encryption algorithm
Published 2018“…Chaotic-based image encryption algorithms are countless in number. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
Get full text
Get full text
Get full text
Article
