Search Results - addition ((_ different) OR (a difference)) ((encryption algorithm) OR (evolutionary algorithm))
Search alternatives:
- a difference »
-
1
Reusable data-path architecture for encryption-then-authentication on FPGA
Published 2023“…Reuse of resources or identical functions however require controllers that enable sharing of data path that can also has different �rounds� of transforms required for different modes either PHOTON or LED in this case, in addition to controllers for individual algorithm. …”
Article -
2
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…Those approaches named as, Encryption for Absolute Coefficient Level, Encryption of Intra Prediction Mode, and Encryption of Motion Vector Difference (MVD). …”
Get full text
Get full text
Thesis -
3
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…In addition, Triple Data Encryption Standard (3DES) was also simulated as the encryption algorithm to compare the speedup performance with AES encryption.…”
Get full text
Get full text
Thesis -
4
-
5
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…XTS mode of operation will be evaluated in terms of performance with different encryption algorithms such as AES (Advanced Encryption Standard), RC6 (Rivest Cipher version 6), and Twofish. …”
Get full text
Get full text
Thesis -
6
The Performance of the 3DES and Fernet Encryption in Securing Data Files
Published 2024journal::journal article -
7
The performance of the 3DES and Fernet encryption in securing data files
Published 2024“…Therefore, this study aims to implement the symmetric encryption algorithms known as 3DES and Fernet methods as a means for securing files. …”
Get full text
Article -
8
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
9
The performance of the 3DES and fernet encryption in securing data files
Published 2024“…Therefore, this study aims to implement the symmetric encryption algorithms known as 3DES and Fernet methods as a means for securing files. …”
Get full text
Get full text
Get full text
Article -
10
Evolutionary Fuzzy ARTMAP Neural Networks for Classification of Semiconductor Defects
Published 2014“…In addition, one of the proposed EANNs incorporates a facility to learn overlapping samples of different classes from the imbalanced data environment. …”
Get full text
Get full text
Get full text
Article -
11
Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map
Published 2023“…Permutation and substitution approaches of image encryption were deployed to address the issue of images volume and differing sizes. …”
Get full text
Get full text
Get full text
Article -
12
Artificial Neural Controller Synthesis in Autonomous Mobile Cognition
Published 2009“…This paper describes a new approach in using multi-objective evolutionary algorithms in evolving the neural network that acts as a controller for the phototaxis and radio frequency localization behaviors of a virtual Khepera robot simulated in a 3D, physics-based environment. …”
Get full text
Get full text
Article -
13
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
Published 2017“…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. Other storage encryption algorithms, i.e. …”
Get full text
Get full text
Get full text
Thesis -
14
Artificial Neural Controller Synthesis in Autonomous Mobile Cognition
Published 2009“…This paper describes a new approach in using multi-objective evolutionary algorithms in evolving the neural network that acts as a controller for the phototaxis and radio frequency localization behaviors of a virtual Khepera robot simulated in a 3D, physics-based environment. …”
Get full text
Get full text
Get full text
Article -
15
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004“…Among these new algorithms is Twofish. Twofish is a promising 128-bit block which was one of the 5 finalists in the National Institute of Standards and Technology organized competition as the Advanced Encryption Standard. …”
Get full text
Get full text
Final Year Project -
16
-
17
Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
Published 2013“…This standard uses AESXTS as a building block for the protection of data. For an effective storage encryption implementation, two well known methods are software based encryption and hardware based encryption. …”
Get full text
Get full text
Thesis -
18
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
Get full text
Get full text
Get full text
Article -
19
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
Get full text
Get full text
Get full text
Article -
20
Identifying movement of object in multiple images via particle swarm optimization algorithm / Mohd Haidhar Iqbal Hassan
Published 2016“…For example, similar to one game and that is a spot the difference of images. When human test this game it maybe take a few minutes to spot the difference from that images and sometimes the result is incorrect. …”
Get full text
Get full text
Student Project
