Search alternatives:
"conquer algorithm." » "control algorithm."
"cipher algorithm." » "filter algorithm.", "linear algorithm.", "faster algorithm."
1
...Lightweight block cipher algorithms are vital for constrained environment. There are many...
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
2
...Lightweight block cipher algorithms are vital for constrained environment. It is easy to propose...
Get full text
Get full text
Get full text
Conference or Workshop Item
3
by Baase, Sara.
Published 1988
Subjects: ...Computer algorithms....
Book
4
by Baase, Sara.
Published 1978
Subjects: ...Computer algorithms....
Book
5
... will determine the performance of an algorithm. A Divide-and-Conquer algorithm is the most efficient algorithm...
Get full text
Get full text
Get full text
Article
6
by Tat Wi, Charomie
Published 2010
..., Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better....
Get full text
Get full text
Undergraduates Project Papers
7
by Charomie, Tat Wi
Published 2010
... which is encrypted and be decrypted to its readable form.As a conclusion,Caesar cipher algorithm can...
Get full text
Get full text
Get full text
Undergraduates Project Papers
8
9
10
11
...Lightweight block cipher algorithms are very important for constraint environment. This paper...
Get full text
Get full text
Get full text
Article
12
... implementation speed and not introducing error propagation. The stream cipher algorithms evaluated are based...
Get full text
Get full text
Get full text
Get full text
Article
13
Subjects: ...Computer algorithms....
Book
14
by Horowitz, Ellis., Sahni, Sartaj,
Published 1978
Subjects: ...Computer algorithms....
Book
15
16
17
by Bhanu, Bir.
Published 2004
Book
18
Published 2007
Subjects: ...Computer algorithms Congresses....
Book
19
Table of Contents: ...-Inspired Computing Algorithms -- Quantum-Inspired Evolutionary Algorithms -- Plant-Inspired Algorithms...
Book
20
Published 2005
Book