Search Results - _ contributing ((((function algorithm) OR (encryption algorithm))) OR (conversion algorithm))

Refine Results
  1. 1

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…This complexity can be done by designing an algorithm that consists of substitution function and permutation function which provides confusion and diffusion properties. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Designing New Block Cipher Based On Genetic Algorithm Approach by Nur Hafiza Binti Zakaria, Ramlan Mahmod, Nur Izura Udzir, Zuriati Ahmad Zukarnain, Suriyani Ariffin

    Published 2024
    “…The structure of the components has a fixed block size which is 128 bits and a key size of 128 bits. There are three functions for each encryption process which are substitution function, crossover and mutation function and add round key function. …”
    Article
  3. 3

    Efficient dynamic DNA-based block cipher algorithm by Chng, Chern Wei

    Published 2023
    “…The DNA-based MixColumns operation functions as a pseudo-random number generator, generating an encrypted random number for the purpose of encryption. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Dynamic determinant matrix-based block cipher algorithm by Juremi, Julia

    Published 2018
    “…The performance analysis in terms of processing speed of the encryption and decryption process of the DDBC algorithm shows minimal differences in both AES and DDBC algorithm despite of the difference method of transformation used in both algorithms. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Dynamic S-boxes and spiral permutation function on Fibonacci sequence for secure block cipher / Kamsiah Mohamed by Mohamed, Kamsiah

    Published 2022
    “…In this thesis, the Spiral Fibonacci is proposed for a permutation function to diffuse bit permutation in improving cryptography algorithm efficiency. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid by Zahid, Zuhaili

    Published 2008
    “…The fundamental is to adopt an appropriate fitness function for choosing the best chromosome which determines the conversion rule of real numbers into integers during the transformation. …”
    Get full text
    Get full text
    Thesis
  7. 7

    On the Computational Cost of Cocks’ Identity Based Encryption by Moo, Gabriel Ka Lin, Arif Mandangan, Rozaimi Zakaria

    Published 2018
    “…Therefore, the aim of this paper is to investigate which algorithm in Cocks’ Identity Based Encryption consumes high computational cost and subsequently contributes to its inefficiency. …”
    Get full text
    Get full text
    Article
  8. 8

    Enhancing performance of XTS cryptography mode of operation using parallel design by Ahmed Alomari, Mohammad

    Published 2009
    “…Performance evaluation shows that XTS exhibits faster speed when an RC6 encryption algorithm is used, compared to other encryption algorithms such as AES and Twofish. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    The future of money: cryptocurrency is the way to go in Malaysia / Dr. Zuraidah Mohamed Isa, Dr. Dahlia Ibrahim and Dr. Mohamad Hanif Abu Hassan by Mohamed Isa, Zuraidah, Ibrahim, Dahlia, Abu Hassan, Mohamad Hanif

    Published 2022
    “…Cryptocurrency is a system that uses computers to mine it, where mining requires the solution of several mathematical algorithms. As a result, the algorithms are incomprehensible to the vast majority of hackers. …”
    Get full text
    Get full text
    Book Section
  12. 12
  13. 13

    The performance of the 3DES and Fernet encryption in securing data files by Mohd, Siti Munirah, Kamarudin, Shafinah, Yahya, Norhanizah, Hasan, Sazlinah, Mahamad Zakaria, Muhammad Luqman, Sulaiman, Sahimel Azwal, Setyohadi, Djoko Budiyanto

    Published 2024
    “…Therefore, this study aims to implement the symmetric encryption algorithms known as 3DES and Fernet methods as a means for securing files. …”
    Get full text
    Article
  14. 14
  15. 15

    Forecasting and Trading of the Stable Cryptocurrencies With Machine Learning and Deep Learning Algorithms for Market Conditions by Shamshad, H., Ullah, F., Ullah, A., Kebande, V.R., Ullah, S., Al-Dhaqm, A.

    Published 2023
    “…Moreover, the research experiments are repeated several times to achieve the best results by employing hyperparameter tuning of each algorithm. This involves selecting an appropriate kernel and suitable data normalization technique for SVR, determining ARIMA's (p, d, q) values, and optimizing the loss function values, number of neurons, hidden layers, and epochs in LSTM models. …”
    Get full text
    Get full text
    Article
  16. 16

    Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure by Asbullah, Muhammad Asyraf

    Published 2015
    “…Moreover, for the purpose of empirical evidences, some parameters are chosen in the course of the process to validate the efficiency in terms of algorithmic running time and memory consumptions. We then conduct a comparative analysis toward estimating the running time during the encryption and decryption process. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal by Shaikh, Muhammad Umair, Ahmad, Siti Anom, Wan Adnan, Wan Azizun

    Published 2018
    “…This study demonstrates contributions by applying these ideas to two classical problems on the natural algorithm calculation and signal processing.…”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    The performance of the 3DES and fernet encryption in securing data files by Siti Munirah, Mohd, Shafinah, Kamarudin, Norhanizah, Yahya, Sazlinah, Hasan, Muhammad Luqman, Mahamad Zakaria, Sahimel Azwal, Sulaiman, Setyohadi, Djoko Budiyanto

    Published 2024
    “…Therefore, this study aims to implement the symmetric encryption algorithms known as 3DES and Fernet methods as a means for securing files. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…The thesis also compares the results of enough images of various sizes generated by the proposed algorithms with the results of other fractal coding methods to confirm the algorithms’ clarity, reliability and validity. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems by Al-Ghaili A.M., Kasim H., Othman M., Hassan Z.

    Published 2023
    “…A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. …”
    Book Chapter