Search alternatives:
"conquer algorithm." » "computer algorithms.", "control algorithm."
"cipher algorithm." » "filter algorithm.", "linear algorithm.", "faster algorithm."
1
...Lightweight block cipher algorithms are vital for constrained environment. There are many...
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
2
...Lightweight block cipher algorithms are vital for constrained environment. It is easy to propose...
Get full text
Get full text
Get full text
Conference or Workshop Item
3
... will determine the performance of an algorithm. A Divide-and-Conquer algorithm is the most efficient algorithm...
Get full text
Get full text
Get full text
Article
4
by Tat Wi, Charomie
Published 2010
..., Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better....
Get full text
Get full text
Undergraduates Project Papers
5
by Charomie, Tat Wi
Published 2010
... which is encrypted and be decrypted to its readable form.As a conclusion,Caesar cipher algorithm can...
Get full text
Get full text
Get full text
Undergraduates Project Papers
6
7
8
9
...Lightweight block cipher algorithms are very important for constraint environment. This paper...
Get full text
Get full text
Get full text
Article
10
... implementation speed and not introducing error propagation. The stream cipher algorithms evaluated are based...
Get full text
Get full text
Get full text
Get full text
Article
11
by Jones, Neil C.
Published 2004
Table of Contents: ...Divide-and-conquer algorithms --...
Book
12
by Mahdi, Reyadh H
Published 2009
... generator in a stream cipher algorithm. The proposed random key generator is simply designed to produce a...
Get full text
Get full text
Get full text
Thesis
13
.... Approach: The cipher algorithm was a 16-round Feistel network with a bijective function f and was made up...
Get full text
Get full text
Get full text
Article
14
...SNOW 3G is a stream cipher algorithm used as encryption algorithm in third generation mobile phone...
Get full text
Get full text
Get full text
Article
15
by Shameri, Ahmad Zuri
Published 2006
... respectively. For confidentiality, stream cipher algorithm used is based on the linear feedback register (LFSR...
Get full text
Get full text
Monograph
16
... cryptography system. Advanced Encryption Standard (AES) is a symmetric block cipher algorithm that passed...
Get full text
Get full text
Get full text
Get full text
Article
17
by Khalaf, Emad T
Published 2012
...,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key...
Get full text
Get full text
Get full text
Undergraduates Project Papers
18
by Mohd Ali, Fakariah Hani
Published 2009
... of this new 128-bit block cipher algorithm will increase the protection of the national information...
Get full text
Get full text
Thesis
19
Published 1997
Table of Contents: ... encryption algorithm / Matthew Kwan -- TWOPRIME : a fast stream ciphering algorithm / Cunsheng Ding...
Book
20
by Saeed, Auday H.
Published 2015
... secure symmetric cipher algorithm. Since the declaration of Rijndael as AES this cipher has been...
Get full text
Get full text
Thesis