Search Results - (( using optimization based algorithm ) OR ( based encryption using algorithm ))

Refine Results
  1. 1
  2. 2

    A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption by Nurnajmin Qasrina Ann, Ayop Azmi

    Published 2023
    “…The fitness function used is the correlation function in the SKF algorithm to optimize the cipher image produced using the Lorenz system. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Thesis
  4. 4

    A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP) by Khan, M.A., Ali, A., Jeoti, V., Manzoor, S.

    Published 2018
    “…Therefore, this paper reports a systematic design methodology to generate chaotic S-box utilizing DDT and that can be used in multimedia encryption algorithms. DDT within the design loop is used to optimize differential approximation probability. …”
    Get full text
    Get full text
    Article
  5. 5

    A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP) by Khan, M.A., Ali, A., Jeoti, V., Manzoor, S.

    Published 2018
    “…Therefore, this paper reports a systematic design methodology to generate chaotic S-box utilizing DDT and that can be used in multimedia encryption algorithms. DDT within the design loop is used to optimize differential approximation probability. …”
    Get full text
    Get full text
    Article
  6. 6

    Exploring a Q-learning-based chaotic naked mole rat algorithm for S-box construction and optimization by Kamal Zuhairi, Zamli, Din, Fakhrud, Alhadawi, Hussam S.

    Published 2023
    “…This paper introduces a new variant of the metaheuristic algorithm based on the naked mole rat (NMR) algorithm, called the Q-learning naked mole rat algorithm (QL-NMR), for substitution box construction and optimization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Clonal selection algorithm for the cryptanalysis of a simple substitution cipher by Ahmad, Badrisham, Maarof, Mohd. Aizaini, Ibrahim, Subariah, Kutty Mammi, Hazinah, Mohamed Amin, Muhalim, Z'aba, Muhammad Reza

    Published 2006
    “…The algorithm is based on the Clonalg algorithm developed by de Castro and Von Zuben. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9
  10. 10

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA by Ahmed, Shakil

    Published 2013
    “…For an effective storage encryption implementation, two well known methods are software based encryption and hardware based encryption. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Route optimization security in mobile IPv6 wireless networks: a test-bed experience by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Security enhancement of route optimization in mobile IPv6 networks by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field by Md Yasin, Sharifah

    Published 2011
    “…The new scalar representation is in base 2 using digit 0, 1 and 3. The special NAF property is adopted in the new {0,1,3}-NAF scalar. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Secure lightweight client for cloud-based E-Health Model by Zhang, Xiaowei

    Published 2023
    “…Thirdly, an authorization algorithm named federated proxy implements for fine-grained access control based on CP-ABE (FPI-CP-ABE) is proposed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    A novel and high capacity audio steganography algorithm based on adaptive data embedding positions by Shahadi H.I., Jidin R., Way W.H.

    Published 2023
    “…The WBM is preceded by preparing the cover audio in order to select the bits-positions that can possibly be used for embedding from each detail coefficient based on coefficient amplitude then copy the contents of the selected bits-positions and arrange them in blocks of bits. …”
    Article
  18. 18

    An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network by Ramli, Sofia Najwa

    Published 2016
    “…To enhance the overall performance, this thesis also evaluates the uniqueness and the stability of ECG signal using Independent Component Analysis (ICA) and fast Fourier Transform (FFT) algorithm respectively as the signal is applied as inputs of the proposed ECG-based authentication protocol model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    CPU-based Application Transformation to CUDA: Transformation of CPU-based Applications To Leverage on Graphics Processors using CUDA by Mohd Nazlee, Anas, Hussin, Fawnizu Azmadi

    Published 2012
    “…Successful attempt at porting Serpent encryption algorithm and Lattice Boltzmann Method provided up to 7 times throughput performance gain and up to 10 times execution time performance gain respectively over the CPU. …”
    Get full text
    Get full text
    Book
  20. 20

    Tranformation of CPU-based Applications To Leverage on Graphics Processors using CUDA by Hussin, Fawnizu Azmadi, Mohd Nazlee, Anas, Zain Ali, Noohul Basheer

    Published 2010
    “…Successful attempt at porting Serpent encryption algorithm and Lattice Boltzmann Method provided up to 7 times throughput performance gain and up to 10 times execution time performance gain respectively over the CPU. …”
    Get full text
    Get full text
    Article