Search Results - (( _ application security algorithm ) OR ( some application during algorithm ))*
Search alternatives:
- application during »
- some application »
- during algorithm »
-
1
-
2
-
3
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Article -
4
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…Thus, the scheme is robust and performed efficiently, and may be used in real-time applications. For future studies, the proposed encryption algorithm can be enhanced by combined compression encryption techniques, which would increase the encryption efficiency. …”
Get full text
Get full text
Thesis -
6
A secure, anonymous and verifiable E-Voting system
Published 2020Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
-
8
RISC-V instruction set extension on blockchain application
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Dual authentication for bluetooth connection
Published 2014Get full text
Get full text
Get full text
Article -
10
Elimination of raindrops effects in infrared sensitive camera
Published 2007Get full text
Get full text
Get full text
Thesis -
11
A survey on the cryptanalysis of the advanced encryption standard
Published 2006Get full text
Get full text
Conference or Workshop Item -
12
An e-voting application using cryptography technology
Published 2020“…Hashing function mainly encrypts the user's confidential information to prevent theft by other users and the encrypt method can be implement from Visual Studio which is SHA-256 (Secure Hash Algorithm- 256 bits), a cryptographic hash function designed by US NSA (United States National Security Agency). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
-
14
A New Cryptosystem Based on Decimal Numbers and Nonlinear Function
Published 2009Get full text
Get full text
Thesis -
15
-
16
A Hybrid Chaotic Image Encryption Scheme Bas~d on S-Box and Ciphertext Feedback
Published 2007“…Due to some intrinsic features of images, such as bulk data capacity and high correlation among pixels, traditional encryption algorithms such as IDEA, DES and AES are not suitable for practical image encryption, especially for real time applications. …”
Get full text
Get full text
Thesis -
17
Collision probability of one-to-many reversible mapping for IPV6 address generation
Published 2012Get full text
Get full text
Get full text
Proceeding Paper -
18
Distributed Denial-of-Service Defense System
Published 2006Get full text
Get full text
Final Year Project -
19
-
20
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis
