Search Results - different encryption algorithm*
Search alternatives:
- different encryption »
-
1
Randomized text encryption: a new dimension in cryptography
Published 2014“…The proposed technique uses random numbers added to plaintext along with encryption key. After applying encryption technique, each time same plaintext will be converted to different ciphertext provided that encryption key is same or different. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…The hashed keyword will be used in encrypt / decrypt process by using any of 3 encryption algorithm mentioned before. …”
Get full text
Get full text
Thesis -
3
Encryption selection for WLAN IEEE802.11G
Published 2013“…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
Get full text
Get full text
Thesis -
4
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis -
5
Performance evaluation for different data encryption algorithms on wireless sensor network (WSN)
Published 2018“…Then the results are compared to the average energy dissipation (μJ) by applying different encryption data, AES, SF and SIT algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Data privacy comparison using advanced encryption standard (AES) and data encryption standard (DES) / Hikma Farah Ali
Published 2019“…Proposed algorithm AES, has a different key sizes ,as 128,192 and 256. …”
Get full text
Get full text
Thesis -
7
A shift column different offset for better Rijndael security
Published 2009“…Rijndael, currently the Advanced Encryption Standard Algorithms (AES) is a block cipher uses a 128, 192, or 256-bit key length to encrypt 128-bit blocks of plaintext. …”
Get full text
Get full text
Get full text
Article -
8
Enhancing selective encryption for H.264/AVC using advanced encryption standard
Published 2010“…Also there are many ways could be used in video encryption methods such as combining several different encryption methods with video compression to pass a secret video streaming. …”
Get full text
Get full text
Get full text
Article -
9
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
IoT data encryption algorithm for security
Published 2020Get full text
Get full text
Get full text
Get full text
Thesis -
11
Partial encryption of compressed images employing FPGA
Published 2005“…The compression algorithm decomposes images into several different parts. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Book Section -
13
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
Published 2017“…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. Other storage encryption algorithms, i.e. …”
Get full text
Get full text
Get full text
Thesis -
14
Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
Published 2013“…For an effective storage encryption implementation, two well known methods are software based encryption and hardware based encryption. …”
Get full text
Get full text
Thesis -
15
Effect of file sizes on encryption and decryption in constrained devices / Nurnadia Sapri
Published 2015“…Therefore, the effect of file sizes on encryption and decryption in constrained devices have been analyzed using two types of cryptographic algorithm which is AES-128 (symmetric-key encryption) and RSA- 2048 (asymmetric-key encryption) based on the different file size, execution time, and the throughput. …”
Get full text
Get full text
Thesis -
16
Performance comparison encryption of IPSEC VPN encryption techniques / Nur Hasyimah Mohd Ridzuan
Published 2015“…The implementation of IPSEC protocol via Cisco equipment was introduced. Results indicate different algorithms (with and without encryption), hashing method and packet length have influence on Round Trip Time (RTT) result.…”
Get full text
Get full text
Thesis -
17
Performance comparison of encryption IPsec VPN encryption techniques / Nur Hasyimah Mohd Ridzuan and Ruhani Ab Rahman
“…The implementation of IPSEC protocol via Cisco equipments was introduced. Results indicate different algorithms (with and without encryption), hashing method and packet length have influence on Round Trip Time (RTT).…”
Get full text
Get full text
Article -
18
The performance of the 3DES and Fernet encryption in securing data files
Published 2024“…Therefore, this study aims to implement the symmetric encryption algorithms known as 3DES and Fernet methods as a means for securing files. …”
Get full text
Article -
19
An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm
Published 2017“…The experiment result shows that proposed method gives good performance in compression and encryption. Encrypting successfully produced encrypted data that is highly different data compared to original data. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
Get full text
Get full text
Get full text
Article
