Search Results - (( using function a algorithm ) OR ( based encryption method algorithm ))
Search alternatives:
- encryption method »
- method algorithm »
- using function »
- a algorithm »
- function a »
-
1
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
2
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006“…However, until now, the cryptography hardware is still not commonly used especially in FPGA. In this project, the Blowfish encryption algorithm is chosen because it is among the safest algorithm used nowadays. …”
Get full text
Get full text
Monograph -
3
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…Additionally, a DNA-based ShiftRow function was proposed to enhance the execution of permutation by methodically displacing the rows of the state array using different offset values. …”
Get full text
Get full text
Thesis -
4
Protection of the texts using Base64 and MD5
Published 2012“…This paper discusses an encryption method using base64, which is a set of encoding schemes that convert the same binary data to the form of a series of ASCII code. …”
Get full text
Get full text
Get full text
Article -
5
A new public key cryptosystem based on IFS
Published 2010“…In the proposed public-key encryption algorithm, generate iterated function systems as a global public element, then its Hutchinson operator is used as a public key. …”
Get full text
Get full text
Get full text
Article -
6
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…The fitness function used is the correlation function in the SKF algorithm to optimize the cipher image produced using the Lorenz system. …”
Get full text
Get full text
Thesis -
7
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…This research also proposes a new method namely RotateSwapDeterminant function that uses rotation and swapping of the bit based on the 4x4 determinant computations and will act as the permutation layer in the DDBC algorithm. …”
Get full text
Get full text
Thesis -
8
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Two encryption functions in PHP has been used for detecting injected object; bcrypt methods in Laravel and MD5 that generate 32 random keys. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Breaking A Playfair Cipher Using Single and Multipoints Crossover Based on Heuristic Algorithms
Published 2023Conference Paper -
10
-
11
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…This key can then be used to encrypt subsequent communications using a symmetric-key cipher. …”
Get full text
Get full text
Student Project -
12
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
Published 2018“…Hence, a validation protocol algorithm based on hash function labelling provides a one-time security header for transferable files that protects data in transit against any unauthorized injection. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…The result shows that the proposed method improves the security problem of the system, the message-digest algorithm (MD5) is used to encrypt the user password, and a strict role authorisation system is designed to realise the access and manage the system�s security. � 2023 by author(s). …”
Article -
14
Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation
Published 2022“…The purpose of this project is to reduce dynamic thermal power dissipation of SHA-256 unfolding transformation. State encoding is a method used in reducing power design strategies that have been proposed to lower the dynamic power dissipation of the algorithm. …”
Get full text
Get full text
Get full text
Proceeding -
15
Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits
Published 2017“…These days the most common block cipher is the AES Rijndael, which is used as a standard of symmetric encryption in many countries. …”
Get full text
Get full text
Conference or Workshop Item -
16
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis -
17
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…Hashing function implementation have been using in this system as its cryptography algorithm. …”
Get full text
Get full text
Monograph -
18
Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari
Published 2014“…Nowadays, there are a lot of cryptography method has been applied. One of the most popular cryptography methods is Advance Encryption Standard (AES). …”
Get full text
Get full text
Thesis -
19
Systematic literature review: Trend analysis on the design of lightweight block cipher
Published 2024journal::journal article -
20
An improved chaotic image encryption algorithm
Published 2018“…Chaotic-based image encryption algorithms are countless in number. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
