Search Results - differential ((generation algorithm) OR (encryption algorithm))
Search alternatives:
- generation algorithm »
-
1
Message based random variable length key encryption algorithm.
Published 2009“…Long and variable key length made key exhaustive search and differential attack impossible. None fixed size key caused avoidance of replaying and other attacks that can happen on fixed sized key algorithms. …”
Get full text
Get full text
Article -
2
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…The DNA-based MixColumns operation functions as a pseudo-random number generator, generating an encrypted random number for the purpose of encryption. …”
Get full text
Get full text
Thesis -
3
A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP)
Published 2018“…Therefore, this paper reports a systematic design methodology to generate chaotic S-box utilizing DDT and that can be used in multimedia encryption algorithms. …”
Get full text
Get full text
Article -
4
A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP)
Published 2018“…Therefore, this paper reports a systematic design methodology to generate chaotic S-box utilizing DDT and that can be used in multimedia encryption algorithms. …”
Get full text
Get full text
Article -
5
A block cipher based on genetic algorithm
Published 2016“…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
Get full text
Get full text
Get full text
Thesis -
6
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…In this thesis, new algorithms are proposed for the key generation, encryption and decryption module of KD-3D-CA block cipher based on von Neumann (3D) cellular automata. …”
Get full text
Get full text
Thesis -
7
Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security
Published 2010“…The current parametric encryption algorithms suffer the unconventional and paranormal attacks. …”
Get full text
Get full text
Proceeding Paper -
8
Secure block cipher inspired by the human immune system
Published 2012“…Symmetric encryption block cipher is an important cryptographic algorithm and the quest of enhancing data security is crucial due to the heavy usage of internet and mobile devices worldwide. …”
Get full text
Get full text
Thesis -
9
Randomized text encryption: a new dimension in cryptography
Published 2014“…Two different characters are generated against single character of plaintext that doubles the size of encrypted text. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Dynamic S-boxes and spiral permutation function on Fibonacci sequence for secure block cipher / Kamsiah Mohamed
Published 2022“…It is a linear recurrence in which the nth element of the sequence is related to its predecessors through a recurrence of recursive algorithms. Meanwhile, the nine dynamic S-box was designed based on the key generated to improve the substitution function. …”
Get full text
Get full text
Thesis -
11
-
12
A novel image encryption using an integration technique of blocks rotation based on the Magic cube and the AES Algorithm
Published 2012“…Finally, experimental results and security analysis show that the proposed image encryption scheme not only encrypts the picture to achieve perfect hiding, but the algorithm can also withstand exhaustive, statistical and differential attacks.…”
Get full text
Get full text
Get full text
Article -
13
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
Get full text
Get full text
Get full text
Article -
14
A new image encryption algorithm based on single S-box and dynamic encryption step
Published 2021“…Under the control of the dynamic encryption step algorithm, it effectively destroys the correlation between the source image’s pixels. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Experiment -
15
Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits
Published 2017“…These days the most common block cipher is the AES Rijndael, which is used as a standard of symmetric encryption in many countries. Several studies have shown a theoretical attack exploiting the AES key expansion algorithm which allows significant reduction in the complexity time to break the cipher, compared to the brute force attack. …”
Get full text
Get full text
Conference or Workshop Item -
16
A Hybrid Chaotic Image Encryption Scheme Bas~d on S-Box and Ciphertext Feedback
Published 2007“…is a complete image encryption scheme. This scheme is also shown insecure against the differential attack in the thesis. …”
Get full text
Get full text
Thesis -
17
Design and Implementation of a Genetic Algorithm-Based Block Cipher For Enhanced Cryptographic Security
Published 2025conference output::conference proceedings::conference paper -
18
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…The performance analysis in terms of processing speed of the encryption and decryption process of the DDBC algorithm shows minimal differences in both AES and DDBC algorithm despite of the difference method of transformation used in both algorithms. …”
Get full text
Get full text
Thesis -
19
Cryptanalysis and design of chaos based image encryption schemes
Published 2025“…Furthermore, we present a grayscale image encryption scheme utilizing a permutation-diffusion architecture, as well as a color image encryption scheme based on a genetic algorithm and the 2D-SHCM. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…In addition, the hyperparameter tuning problem is considered in this research to improve the developed hybrid model by using the AOA algorithm. Lastly, a new hybrid technique suggests tackling the current image encryption application problem by using the estimated parameters of chaotic systems with an optimization algorithm, the SKF algorithm. …”
Get full text
Get full text
Thesis
