Search Results - evaluation system difference encryption algorithm
Search alternatives:
- evaluation system »
- difference »
-
1
-
2
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…A series of simulations were conducted using MATLAB to evaluate the performance of the proposed chaotic-based encryption algorithm for FTP through different analyses covering key sensitivity, histogram, correlations, differential, information entropy, and encryption/decryption speed. …”
Get full text
Get full text
Get full text
Article -
3
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
Published 2017“…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. …”
Get full text
Get full text
Get full text
Thesis -
4
Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map
Published 2023“…The average encryption time of 184(μs) on seven (7) images showed that it could to be deployed for real-time systems. …”
Get full text
Get full text
Get full text
Article -
5
Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid
Published 2015“…This research evaluates the performance of three different symmetric cryptography algorithms. …”
Get full text
Get full text
Thesis -
6
Performance Analysis of Advanced Encryption Standards for Voice Cryptography with Multiple Patterns
Published 2025“…Moreover, performance evaluation performance indicators that can be used to evaluate AES include; the encryption and decryption time, the CPU usage and how well AES performs on different platforms. …”
Article -
7
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
8
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
Published 2019“…Moreover, the complexity performance of the system is evaluated by Sample Entropy algorithm. Simulation results show that the new system has a wide hyperchaotic range with high complexity and sensitivity dependence. …”
Get full text
Get full text
Thesis -
9
-
10
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
Get full text
Get full text
Get full text
Thesis -
11
A new 128-bit block cipher
Published 2009“…Secured communication can be achieved by encrypting and hiding data transmission when it is stored on a system. …”
Get full text
Get full text
Thesis -
12
Prospective Control Systems and Cyber-Securities for Electrical Secondary Substations
Published 2023Conference Paper -
13
-
14
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Article -
15
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
-
17
-
18
A novel framework for secure cryptocurrency transactions using quantum crypto guard
Published 2025“…In addition, the existing algorithms face difficulties like slow transaction speeds, interoperability issues between different cryptocurrencies, and privacy concerns. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
