Search Results - different ((generation algorithm) OR (((extraction algorithm) OR (encryption algorithm))))

Refine Results
  1. 1
  2. 2
  3. 3

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    A shift column different offset for better Rijndael security by Mahmod, Ramlan, Ali, Sherif Abdulbari, Abd Ghani, Abdul Azim

    Published 2009
    “…The secrecy of an encryption algorithm is measured in terms of the computational power and time required to extract the secret key. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Encryption selection for WLAN IEEE802.11G by Ahmad, Zahrol Azam

    Published 2013
    “…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…These processes repeated until whole mesaage get involved into the last cipher. Encrypted messages are not equal under different run. …”
    Get full text
    Get full text
    Article
  7. 7

    Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security by H. Belgassem, Seddeq

    Published 2004
    “…Both old and new implementations are used to encrypt and decrypt different sizes and types of files using different generated key sizes. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing by Hameed, Mustafa Emad

    Published 2022
    “…The Diffie-Hellman key exchange and Rivest Shamir Adleman (RSA) key generation algorithms have been used to authenticate the receiver, and key generation for encrypting and decrypting processes, respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys by Shereek, Balkees Mohamed

    Published 2016
    “…The Rivest-Shamir-Adleman algorithm (RSA) is one of the most well-known and strongest public key cryptography algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari by Nazari, Khairul Nashran

    Published 2017
    “…AES is the next generation encryption algorithm replacing the older version which is DES and Triple DES. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Reusable data-path architecture for encryption-then-authentication on FPGA by Abbas Y.A., Jidin R., Jamil N., Zaba M.R.

    Published 2023
    “…For this proposed reusable data-path, we have chosen LED algorithm for encryption and then PHOTON to generate the MAC code. …”
    Article
  14. 14

    Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation by Hassan Disina, Abdulkadir

    Published 2018
    “…Key scheduling algorithm (KSA) is the mechanism that generates and schedules all sub-keys for each round of encryption. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Efficient dynamic DNA-based block cipher algorithm by Chng, Chern Wei

    Published 2023
    “…The DNA-based MixColumns operation functions as a pseudo-random number generator, generating an encrypted random number for the purpose of encryption. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A performance improvement of Domosi’s cryptosystem by Khaleel, Ghassan, Turaev, Sherzod, Mohd Tamrin, Mohd Izzuddin, Alshaikhli, Imad Fakhri Taha

    Published 2015
    “…The cryptosystem uses specific deterministic finite accepters as secret keys for the encryption and decryption. Though this cryptosystem has been proven to be secure against different standard attacks (see [8]), the proposed encryption algorithms in [2, 3] involve exhaustive backtracking in order to generate ciphertexts. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis by Arif Mandangan, Muhammad Asyraf Asbullah, Syed Farid Syed Adnan, Mohammad Andri Budiman

    Published 2024
    “…The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis by Mandangan, Arif, Asbullah, Muhammad Asyraf, Adnan, Syed Farid Syed, Budiman, Mohammad Andri

    Published 2024
    “…The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A performance improvement of Dömösi’s cryptosystem by Khaleel, Ghassan, Turaev, Sherzod, Mohd. Tamrin, Mohd. Izzuddin, Alshaikhli, Imad Fakhri Taha

    Published 2016
    “…The cryptosystem uses specific deterministic finite accepters as secret keys for the encryption and decryption. Though this cryptosystem has been proven to be secure against different standard attacks (see [8]), the proposed encryption algorithms in [2, 3] involve exhaustive backtracking in order to generate ciphertexts. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata by Hamdi, Ayman Majid

    Published 2019
    “…In this thesis, new algorithms are proposed for the key generation, encryption and decryption module of KD-3D-CA block cipher based on von Neumann (3D) cellular automata. …”
    Get full text
    Get full text
    Thesis