Search Results - _ contributing ((((function algorithm) OR (encryption algorithm))) OR (conversion algorithm))
Search alternatives:
- conversion algorithm »
- function algorithm »
-
1
A block cipher based on genetic algorithm
Published 2016“…This complexity can be done by designing an algorithm that consists of substitution function and permutation function which provides confusion and diffusion properties. …”
Get full text
Get full text
Get full text
Thesis -
2
Designing New Block Cipher Based On Genetic Algorithm Approach
Published 2024“…The structure of the components has a fixed block size which is 128 bits and a key size of 128 bits. There are three functions for each encryption process which are substitution function, crossover and mutation function and add round key function. …”
Article -
3
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…The DNA-based MixColumns operation functions as a pseudo-random number generator, generating an encrypted random number for the purpose of encryption. …”
Get full text
Get full text
Thesis -
4
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…The performance analysis in terms of processing speed of the encryption and decryption process of the DDBC algorithm shows minimal differences in both AES and DDBC algorithm despite of the difference method of transformation used in both algorithms. …”
Get full text
Get full text
Thesis -
5
Dynamic S-boxes and spiral permutation function on Fibonacci sequence for secure block cipher / Kamsiah Mohamed
Published 2022“…In this thesis, the Spiral Fibonacci is proposed for a permutation function to diffuse bit permutation in improving cryptography algorithm efficiency. …”
Get full text
Get full text
Thesis -
6
Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid
Published 2008“…The fundamental is to adopt an appropriate fitness function for choosing the best chromosome which determines the conversion rule of real numbers into integers during the transformation. …”
Get full text
Get full text
Thesis -
7
On the Computational Cost of Cocks’ Identity Based Encryption
Published 2018“…Therefore, the aim of this paper is to investigate which algorithm in Cocks’ Identity Based Encryption consumes high computational cost and subsequently contributes to its inefficiency. …”
Get full text
Get full text
Article -
8
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…Performance evaluation shows that XTS exhibits faster speed when an RC6 encryption algorithm is used, compared to other encryption algorithms such as AES and Twofish. …”
Get full text
Get full text
Thesis -
9
-
10
Hybrid Energy Encryption of Wireless Power Transfer Algorithm for Near Field Range
Published 2024thesis::doctoral thesis -
11
The future of money: cryptocurrency is the way to go in Malaysia / Dr. Zuraidah Mohamed Isa, Dr. Dahlia Ibrahim and Dr. Mohamad Hanif Abu Hassan
Published 2022“…Cryptocurrency is a system that uses computers to mine it, where mining requires the solution of several mathematical algorithms. As a result, the algorithms are incomprehensible to the vast majority of hackers. …”
Get full text
Get full text
Book Section -
12
The Performance of the 3DES and Fernet Encryption in Securing Data Files
Published 2024journal::journal article -
13
The performance of the 3DES and Fernet encryption in securing data files
Published 2024“…Therefore, this study aims to implement the symmetric encryption algorithms known as 3DES and Fernet methods as a means for securing files. …”
Get full text
Article -
14
A chaotic neural network based encryption algorithm for MPEG-2 encoded video signal
Published 2012Get full text
Working Paper -
15
Forecasting and Trading of the Stable Cryptocurrencies With Machine Learning and Deep Learning Algorithms for Market Conditions
Published 2023“…Moreover, the research experiments are repeated several times to achieve the best results by employing hyperparameter tuning of each algorithm. This involves selecting an appropriate kernel and suitable data normalization technique for SVR, determining ARIMA's (p, d, q) values, and optimizing the loss function values, number of neurons, hidden layers, and epochs in LSTM models. …”
Get full text
Get full text
Article -
16
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
Published 2015“…Moreover, for the purpose of empirical evidences, some parameters are chosen in the course of the process to validate the efficiency in terms of algorithmic running time and memory consumptions. We then conduct a comparative analysis toward estimating the running time during the encryption and decryption process. …”
Get full text
Get full text
Thesis -
17
Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal
Published 2018“…This study demonstrates contributions by applying these ideas to two classical problems on the natural algorithm calculation and signal processing.…”
Get full text
Get full text
Conference or Workshop Item -
18
The performance of the 3DES and fernet encryption in securing data files
Published 2024“…Therefore, this study aims to implement the symmetric encryption algorithms known as 3DES and Fernet methods as a means for securing files. …”
Get full text
Get full text
Get full text
Article -
19
Fractal coding of bio-metric image for face authentication
Published 2021“…The thesis also compares the results of enough images of various sizes generated by the proposed algorithms with the results of other fractal coding methods to confirm the algorithms’ clarity, reliability and validity. …”
Get full text
Get full text
Thesis -
20
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
Published 2023“…A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. …”
Book Chapter
