Search alternatives:
"cipher algorithm." » "filter algorithm.", "linear algorithm.", "faster algorithm."
"fast algorithm." » "fast algorithms."
1
...Lightweight block cipher algorithms are vital for constrained environment. There are many...
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
2
...Lightweight block cipher algorithms are vital for constrained environment. It is easy to propose...
Get full text
Get full text
Get full text
Conference or Workshop Item
3
by Baase, Sara.
Published 1988
Subjects: ...Computer algorithms....
Book
4
by Baase, Sara.
Published 1978
Subjects: ...Computer algorithms....
Book
5
Published 2003
Table of Contents: ...Solving Certain Matrix Equations by Means of Toeplitz Computations: Algorithms and Applications /...
Book
6
by Tat Wi, Charomie
Published 2010
..., Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better....
Get full text
Get full text
Undergraduates Project Papers
7
by Charomie, Tat Wi
Published 2010
... which is encrypted and be decrypted to its readable form.As a conclusion,Caesar cipher algorithm can...
Get full text
Get full text
Get full text
Undergraduates Project Papers
8
9
10
11
...Lightweight block cipher algorithms are very important for constraint environment. This paper...
Get full text
Get full text
Get full text
Article
12
... implementation speed and not introducing error propagation. The stream cipher algorithms evaluated are based...
Get full text
Get full text
Get full text
Get full text
Article
13
by Blahut, Richard E.
Published 1985
Book
14
Subjects: ...Computer algorithms....
Book
15
by Horowitz, Ellis., Sahni, Sartaj,
Published 1978
Subjects: ...Computer algorithms....
Book
16
17
18
by Bhanu, Bir.
Published 2004
Book
19
Published 2007
Subjects: ...Computer algorithms Congresses....
Book
20
Table of Contents: ...-Inspired Computing Algorithms -- Quantum-Inspired Evolutionary Algorithms -- Plant-Inspired Algorithms...
Book