Search alternatives:
"cipher algorithm." » "filter algorithm.", "linear algorithm.", "faster algorithm."
1
...Lightweight block cipher algorithms are vital for constrained environment. There are many...
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
2
...Lightweight block cipher algorithms are vital for constrained environment. It is easy to propose...
Get full text
Get full text
Get full text
Conference or Workshop Item
3
by Tat Wi, Charomie
Published 2010
..., Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better....
Get full text
Get full text
Undergraduates Project Papers
4
by Charomie, Tat Wi
Published 2010
... which is encrypted and be decrypted to its readable form.As a conclusion,Caesar cipher algorithm can...
Get full text
Get full text
Get full text
Undergraduates Project Papers
5
6
7
8
...Lightweight block cipher algorithms are very important for constraint environment. This paper...
Get full text
Get full text
Get full text
Article
9
... implementation speed and not introducing error propagation. The stream cipher algorithms evaluated are based...
Get full text
Get full text
Get full text
Get full text
Article
10
by Mahdi, Reyadh H
Published 2009
... generator in a stream cipher algorithm. The proposed random key generator is simply designed to produce a...
Get full text
Get full text
Get full text
Thesis
11
.... Approach: The cipher algorithm was a 16-round Feistel network with a bijective function f and was made up...
Get full text
Get full text
Get full text
Article
12
...SNOW 3G is a stream cipher algorithm used as encryption algorithm in third generation mobile phone...
Get full text
Get full text
Get full text
Article
13
by Shameri, Ahmad Zuri
Published 2006
... respectively. For confidentiality, stream cipher algorithm used is based on the linear feedback register (LFSR...
Get full text
Get full text
Monograph
14
... cryptography system. Advanced Encryption Standard (AES) is a symmetric block cipher algorithm that passed...
Get full text
Get full text
Get full text
Get full text
Article
15
by Khalaf, Emad T
Published 2012
...,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key...
Get full text
Get full text
Get full text
Undergraduates Project Papers
16
by Mohd Ali, Fakariah Hani
Published 2009
... of this new 128-bit block cipher algorithm will increase the protection of the national information...
Get full text
Get full text
Thesis
17
Published 1997
Table of Contents: ... encryption algorithm / Matthew Kwan -- TWOPRIME : a fast stream ciphering algorithm / Cunsheng Ding...
Book
18
by Saeed, Auday H.
Published 2015
... secure symmetric cipher algorithm. Since the declaration of Rijndael as AES this cipher has been...
Get full text
Get full text
Thesis
19
... such as confidentiality cipher algorithms proposed to protect the transmissions in different mobile generations...
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
20
...Lightweight block cipher algorithms are vital for constrained environment. Substitution box (S-box...
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item