Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
"cipher algorithm." » "filter algorithm.", "faster algorithm."
"linear algorithm." » "line algorithms."
"cipher algorithm." » "filter algorithm.", "faster algorithm."
"linear algorithm." » "line algorithms."
1
“...Lightweight block cipher algorithms are vital for constrained environment. There are many...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
2
“...Lightweight block cipher algorithms are vital for
constrained environment. It is easy to propose...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
3
by Tat Wi, Charomie
Published 2010
“..., Caesar cipher algorithm can be implemented in hybrid encryption project
to make data secure and better....”Published 2010
Get full text
Get full text
Undergraduates Project Papers
4
by Charomie, Tat Wi
Published 2010
“... which is encrypted and be decrypted to its readable form.As a conclusion,Caesar cipher algorithm can...”Published 2010
Get full text
Get full text
Get full text
Undergraduates Project Papers
5
6
7
by AlDabbagh, Sufyan Salim Mahmood, Alshaikhli, Imad Fakhri Taha, Al-Enezi, Khalid Abdulkareem, Alyaqoup, Mohammed Jasem
Published 2015
“...Lightweight block cipher algorithms are vital
for constrained environment. There are three factors...”Published 2015
Get full text
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
8
“...Lightweight block cipher algorithms are very important for constraint environment. This paper...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article
9
“... implementation speed and not introducing error propagation. The stream cipher algorithms evaluated are based...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article
10
11
12
by Nik Mohamad, Nik Amnah, Dzulkarnain, Ahmad Aidil Arafat, Wilson, Wayne, Bradley, A. P., Petoe, Matthew, Smith, Andrew, Jamaluddin, Saiful Adli, Rahmat, Sarah, Moon, Jackie
Published 2012
Get full textPublished 2012
Get full text
Conference or Workshop Item
13
by Dzulkarnain, Ahmad Aidil Arafat, Wilson, Wayne, Bradley, Andrew, Nik Mohamad, Nik Amnah, Petoe, Matthew, Smith, Andrew, Jamaluddin, Saiful Adli, Ali Hanafiah, Nurlin
Published 2012
Get full textPublished 2012
Get full text
Conference or Workshop Item
14
15
16
Published 1984
Table of Contents:
“...Linear algorithms for convex drawings of planar graphs /...”
Book
17
Graph theory with applications to algorithms and computer science / edited by Y. Alavi ... [et al.].
Published 1985
Table of Contents:
“...A linear algorithm for topological bandwidth in degree three trees /...”
Book
18
by Mahdi, Reyadh H
Published 2009
“... generator in a stream cipher algorithm. The proposed random key generator is simply designed to produce a...”Published 2009
Get full text
Get full text
Get full text
Thesis
19
“.... This technique is further incorporated with a logic algorithm called Adaptive Linear Algorithm (Adaline...”
Get full text
Get full text
20
by Pour, Davood Rezaei, Md. Said, Mohamad Rushdan, Mohd Atan, Kamel Ariffin, Othman, Mohamed
Published 2009
“....
Approach: The cipher algorithm was a 16-round Feistel network with a bijective function f and was made up...”Published 2009
Get full text
Get full text
Get full text
Article


