Search Results - different ((encryption algorithm) OR (generation algorithm))
Search alternatives:
- generation algorithm »
-
1
Data privacy comparison using advanced encryption standard (AES) and data encryption standard (DES) / Hikma Farah Ali
Published 2019“…Proposed algorithm AES, has a different key sizes ,as 128,192 and 256. …”
Get full text
Get full text
Thesis -
2
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
3
Encryption selection for WLAN IEEE802.11G
Published 2013“…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
Get full text
Get full text
Thesis -
4
Message based random variable length key encryption algorithm.
Published 2009“…These processes repeated until whole mesaage get involved into the last cipher. Encrypted messages are not equal under different run. …”
Get full text
Get full text
Article -
5
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…Both old and new implementations are used to encrypt and decrypt different sizes and types of files using different generated key sizes. …”
Get full text
Get full text
Thesis -
6
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
8
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
Published 2016“…The Rivest-Shamir-Adleman algorithm (RSA) is one of the most well-known and strongest public key cryptography algorithms. …”
Get full text
Get full text
Get full text
Thesis -
9
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…AES is the next generation encryption algorithm replacing the older version which is DES and Triple DES. …”
Get full text
Get full text
Thesis -
10
Reusable data-path architecture for encryption-then-authentication on FPGA
Published 2023“…For this proposed reusable data-path, we have chosen LED algorithm for encryption and then PHOTON to generate the MAC code. …”
Article -
11
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…Key scheduling algorithm (KSA) is the mechanism that generates and schedules all sub-keys for each round of encryption. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…The DNA-based MixColumns operation functions as a pseudo-random number generator, generating an encrypted random number for the purpose of encryption. …”
Get full text
Get full text
Thesis -
13
A performance improvement of Domosi’s cryptosystem
Published 2015“…The cryptosystem uses specific deterministic finite accepters as secret keys for the encryption and decryption. Though this cryptosystem has been proven to be secure against different standard attacks (see [8]), the proposed encryption algorithms in [2, 3] involve exhaustive backtracking in order to generate ciphertexts. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. …”
Get full text
Get full text
Get full text
Article -
15
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. …”
Get full text
Get full text
Get full text
Article -
16
A performance improvement of Dömösi’s cryptosystem
Published 2016“…The cryptosystem uses specific deterministic finite accepters as secret keys for the encryption and decryption. Though this cryptosystem has been proven to be secure against different standard attacks (see [8]), the proposed encryption algorithms in [2, 3] involve exhaustive backtracking in order to generate ciphertexts. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…In this thesis, new algorithms are proposed for the key generation, encryption and decryption module of KD-3D-CA block cipher based on von Neumann (3D) cellular automata. …”
Get full text
Get full text
Thesis -
18
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
Published 2019“…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. In this algorithm, the essential requirements of confusion and diffusion are accomplished, and a stochastic sequence is used to enhance the security of encrypted image. …”
Get full text
Get full text
Thesis -
19
Mathematical modelling on communication between two parties / Nor Anees Asyiqin Md Disa, Khairunnisa Munawarah Khairul Anwar and Aniesa Farhana Mazlan
Published 2022“…Kuwakado scheme (2018) had be summarized in key generation, encryption, and decryption algorithm. In this study, point m = (2,4) is chosen since it exists on the elliptic curve and will be calculated until 11G using double-and-add algorithm. …”
Get full text
Get full text
Student Project -
20
Randomized text encryption: a new dimension in cryptography
Published 2014“…Two different characters are generated against single character of plaintext that doubles the size of encrypted text. …”
Get full text
Get full text
Get full text
Get full text
Article
