Search Results - (( using linear block algorithm ) OR ( java application optimization algorithm ))
Search alternatives:
- application optimization »
- java application »
- block algorithm »
-
1
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…The design of the s-box is the most crucial part while designing a new block cipher algorithm since it is the only non-linear element of the cipher. …”
Get full text
Get full text
Thesis -
2
A block cipher based on genetic algorithm
Published 2016“…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
Get full text
Get full text
Get full text
Thesis -
3
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…The significance of block cipher algorithms lies in their versatility and resilience. …”
Get full text
Get full text
Thesis -
4
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…Block cipher algorithms become an essential domain in Information Technology (IT) due to ever increasing the number of attacks. …”
Get full text
Get full text
Get full text
Article -
5
Secure block cipher inspired by the human immune system
Published 2012“…It also measures the diffusion property in linear transformation using branch number in estimating the possible success of differential and linear attacks. …”
Get full text
Get full text
Thesis -
6
Dynamic S-boxes and spiral permutation function on Fibonacci sequence for secure block cipher / Kamsiah Mohamed
Published 2022“…In conclusion, this proposed block cipher can also be used as a secure algorithm by nations, organisations or stakeholders to improve data protection besides contributing to computer security research as an alternative to other cryptographic algorithms. …”
Get full text
Get full text
Thesis -
7
Approximating Non Linear Higher Order ODEs By A Three Point Block Algorithm
Published 2024journal::journal article -
8
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…After that, critical performance measurements and metrics used in 3D–CA are identified. The module of a KD-3DCA block cipher is designed and algorithms of the new KD-3D-CA block cipher are generated. …”
Get full text
Get full text
Thesis -
9
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
10
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
11
Codebook excited linear predictive coding
Published 2011“…In standard Codebook Exited Linear Coding (CELP) the encoding method uses random values for excitation vectors. …”
Get full text
Get full text
Get full text
Book Chapter -
12
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
13
A study on the VLSI partitions: the implementation of Fiduccia-Mattheyses algorithm / Burhanuddin Omar
Published 1997“…To deal with cells of various size , the algorithm progresses by moving one cell at a time between the blocks of the partition while maintaining a desired based on the size of the blocks rather than the number of cells per block. …”
Get full text
Get full text
Thesis -
14
Security analysis of blowfish algorithm
Published 2013“…Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key lengths from 32 bits up to a maximum of 448 bits. …”
Get full text
Get full text
Conference or Workshop Item -
15
Audio encryption and decryption using 3D AES block cipher algorithm / Nur Fattin Nadhrah Saifuddin
Published 2018“…This project purpose is to identify the implementation testing security using 3D AES block cipher algorithm. Besides, this encryption using audio as a data in order to design and develop the project. …”
Get full text
Get full text
Thesis -
16
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
17
-
18
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
19
-
20
Parallel block backward differentiation formulas for solving ordinary differential equations.
Published 2008“…Most common methods for solving stiff systems of ODEs are based on implicit formulae and solved using Newton iteration which requires repeated solution of systems of linear equations with coefficient matrix, I -hβJ . …”
Get full text
Article
