Search Results - (( using modification encryption algorithm ) OR ( java _ replication algorithm ))
Search alternatives:
- replication algorithm »
- using modification »
-
1
-
2
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…ECC can be perfonn by using either finite field or binary field. Text encryption using ECC over bina1y finite ticld, G/(2"' ) has more advantage than Ctnitc field, Gf(p) but the previous study that use ECC and EIGamal for text encryption only represent the system using Gf(p). …”
Get full text
Get full text
Student Project -
3
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
4
-
5
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…Performance has always been the most critical characteristic of a cryptographic algorithm, which determines its effectiveness. In this research the most popular and used algorithm, which is RSA, is implemented with a new modification in order to reduce the calculation time of the algorithm. …”
Get full text
Get full text
Thesis -
6
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…Data integrity is a major concern in IoT technologies, and this issue has started to increase in recent years due to the use of Bluetooth Low Energy (BLE) devices. The unauthorized modification of confidential data is one the main threats and is commonly addressed by cryptographic mechanisms, through encryption. …”
Get full text
Get full text
Thesis -
7
Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant
Published 2018“…For data security, block ciphers like advanced encryption standard are needed. Advanced encryption standard is an encryption algorithm which is widely used to provide security to sensitive information by organizations. …”
Get full text
Get full text
Get full text
Article -
8
A chaotic neural network based encryption algorithm for MPEG-2 encoded video signal
Published 2012Get full text
Working Paper -
9
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
10
-
11
Lao-3d: A Symmetric Lightweight Block Cipher Based on 3d Permutation for Mobile Encryption Application
Published 2024journal::journal article -
12
An overview: Theoretical and mathematical perspectives for advance Encryption standard/Rijndael
Published 2010“…This overview for advance encryption standard achieving a flexibility and uncomplicated handle with this algorithm, which is a challenge of researchers when be used as implementation. © 2010 Asian Network for Scientific Information.…”
Get full text
Get full text
Article -
13
Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi
Published 2023“…El Gamal ciphertext cryptosystem is one of the fluently used algorithms to satisfy the security message or data transmission. …”
Get full text
Get full text
Student Project -
14
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
Published 2021“…For high security, encryption is one of the methods used to protect data against leakage. …”
Get full text
Get full text
Get full text
Thesis -
15
-
16
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
17
-
18
Steganography in webpages using CSS color attributes enhanced by rule-based system
Published 2016“…Integrity is ensured against any modification attempts to the stego-web object through the introduction of Secure Hash Algorithm based checksum (SHA1) in the cookies. …”
Get full text
Get full text
Thesis -
19
AES S-box modification uses affine matrices exploration for increased S-box strength
Published 2025“…This paper modifies the AES S-box algorithm. The modification begins with the irreducible polynomial in the AES S-box, x8 ? …”
Get full text
Get full text
Get full text
Article -
20
An improved wavelet digital watermarking software implementation
Published 2011Get full text
Get full text
Get full text
Book Chapter
