Search Results - ((reconstruction algorithm) OR (((evolution algorithm) OR (encryption algorithm))))
Search alternatives:
- reconstruction algorithm »
- evolution algorithm »
-
1
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
Published 2014“…This recommended encryption algorithm also overcomes the flaw in Ariffin’s encryption procedure. …”
Get full text
Get full text
Get full text
Thesis -
2
Message based random variable length key encryption algorithm.
Published 2009“…Problem statement: A block ciphers provides confidentiality in cryptography but cryptanalysis of the classical block ciphers demonstrated some old weaknesses grabbing a partial key in any stage of encryption procedure leads to reconstructing the whole key. …”
Get full text
Get full text
Article -
3
Enhanced AES algorithm based on 14 rounds in securing data and minimizing processing time
Published 2021“…This paper propose a Secured Modified Advanced Encryption Standard Algorithm with decreasing the rounds of Advanced Encryption Standard (AES) to 14 rounds in order to minimize encryption and decryption process time and increasing digital data security as well. …”
Get full text
Get full text
Get full text
Article -
4
Representation Of Rational Bézier Quadratics Using Genetic Algorithm, Differential Evolution And Particle Swarm Optimization
Published 2013“…Three soft computing techniques namely Genetic Algorithm (GA), Differential Evolution (DE) and Particle Swarm Optimization (PSO) are utilized for the desired manipulation of curves and surfaces. …”
Get full text
Get full text
Thesis -
5
Image compression and encryption
Published 2003“…In this project, the RC4 encryption algorithm has been used. This project utilized MATLAB Wavelet Toolbox Version 6.5 thoroughly for its implementation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Comparison of ECC and RSA algorithms in IOT devices
Published 2019“…Hence, thoughtfully chosen and practically tested encryption algorithm must be performed to enhance the device efficiency and decrease the risk of sensitive data exposure. …”
Get full text
Get full text
Article -
7
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
Published 2012“…Even so, it parallels the evolution of these methods to penetrate systems. Researchers were developed this method for the protection of this algorithm. …”
Get full text
Get full text
Get full text
Thesis -
8
Systematic literature review: Trend analysis on the design of lightweight block cipher
Published 2024Subjects:journal::journal article -
9
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…In the case, where the missing regions of pixels are containing textures, edges, and other image features that are not easily handled by concealment algorithms. It therefore, necessitated to use denoising rather than EC algorithms. …”
Get full text
Get full text
Thesis -
10
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Encryption selection for WLAN IEEE802.11G
Published 2013“…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
Get full text
Get full text
Thesis -
12
Performance evaluation for different data encryption algorithms on wireless sensor network (WSN)
Published 2018“…AES algorithm shows the highest encrypted data size which is with above 234214 bytes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
Get full text
Get full text
Monograph -
14
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Advanced Encryption Standard (AES) was chosen as encryption algorithm and HMAC Standard Hash Algorithm 1 (SHA1) was chosen as HMAC algorithm. …”
Get full text
Get full text
Thesis -
15
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…Several chaos-based image encryption algorithms use low-dimension chaos as the encryption tools. …”
Get full text
Get full text
Thesis -
16
A parallel XTS encryption mode of operation
Published 2009“…In these simulations, AES is used as encryption algorithm with 256-bit encryption key.…”
Get full text
Get full text
Conference or Workshop Item -
17
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
Get full text
Get full text
Get full text
Article -
18
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
Get full text
Get full text
Thesis -
19
A new image encryption algorithm based on single S-box and dynamic encryption step
Published 2021“…Under the control of the dynamic encryption step algorithm, it effectively destroys the correlation between the source image’s pixels. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Experiment -
20
A novel image encryption using an integration technique of blocks rotation based on the Magic cube and the AES Algorithm
Published 2012“…In recent years, several encryption algorithms have been proposed to protect digital images from cryptographic attacks. …”
Get full text
Get full text
Get full text
Article
