Search Results - (( some applications security algorithm ) OR ( based application during algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    An enhanced color image encryption algorithm using LT-PRNG by Mohammed Ismael, Saba

    Published 2018
    “…Although these algorithms are simple and effective to some extent, most of them are inefficient due to the following reasons: firstly, there is a low security due to the dynamic degradation of chaotic systems in their realization with a digital computer; secondly, some low-dimension chaos-based encryptions have slow performance speeds because of analytical floating-point computations which makes encryption infeasible in real time. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    A Hybrid Chaotic Image Encryption Scheme Bas~d on S-Box and Ciphertext Feedback by MUHAMMAD ASIM

    Published 2007
    “…Due to some intrinsic features of images, such as bulk data capacity and high correlation among pixels, traditional encryption algorithms such as IDEA, DES and AES are not suitable for practical image encryption, especially for real time applications. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Securing password authentication using MD5 algorithm by Siti Nabilah , Mohammad Zain

    Published 2014
    “…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    On the security of digital signature protocol based on iterated function systems. by M. G. AL-Saidi, Nadia, Md. Said, Mohamad Rushdan

    Published 2011
    “…The proposed algorithm possesses sufficient security against some known attacks applicable on finite field cryptosystems. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20