Search Results - (( some applications security algorithm ) OR ( _ application during algorithm ))*
Search alternatives:
- application during »
- some applications »
- during algorithm »
-
1
-
2
-
3
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Article -
4
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…Thus, the scheme is robust and performed efficiently, and may be used in real-time applications. For future studies, the proposed encryption algorithm can be enhanced by combined compression encryption techniques, which would increase the encryption efficiency. …”
Get full text
Get full text
Thesis -
6
A secure, anonymous and verifiable E-Voting system
Published 2020Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
-
8
RISC-V instruction set extension on blockchain application
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Dual authentication for bluetooth connection
Published 2014Get full text
Get full text
Get full text
Article -
10
Elimination of raindrops effects in infrared sensitive camera
Published 2007Get full text
Get full text
Get full text
Thesis -
11
A survey on the cryptanalysis of the advanced encryption standard
Published 2006Get full text
Get full text
Conference or Workshop Item -
12
An e-voting application using cryptography technology
Published 2020“…Hashing function mainly encrypts the user's confidential information to prevent theft by other users and the encrypt method can be implement from Visual Studio which is SHA-256 (Secure Hash Algorithm- 256 bits), a cryptographic hash function designed by US NSA (United States National Security Agency). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
-
14
A New Cryptosystem Based on Decimal Numbers and Nonlinear Function
Published 2009Get full text
Get full text
Thesis -
15
-
16
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
18
Securing password authentication using MD5 algorithm
Published 2014“…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
Get full text
Get full text
Undergraduates Project Papers -
19
Security analysis of blowfish algorithm
Published 2013Get full text
Get full text
Conference or Workshop Item -
20
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers
