Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
"conquer algorithm." » "computer algorithms.", "control algorithm."
"cipher algorithm." » "filter algorithm.", "linear algorithm."
"faster algorithm." » "fast algorithm.", "filter algorithm.", "fast algorithms."
"conquer algorithm." » "computer algorithms.", "control algorithm."
"cipher algorithm." » "filter algorithm.", "linear algorithm."
"faster algorithm." » "fast algorithm.", "filter algorithm.", "fast algorithms."
1
“...Lightweight block cipher algorithms are vital for constrained environment. There are many...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
2
“...Lightweight block cipher algorithms are vital for
constrained environment. It is easy to propose...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
3
“... will determine the performance of an algorithm. A Divide-and-Conquer algorithm is the most efficient algorithm...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article
4
by Tat Wi, Charomie
Published 2010
“..., Caesar cipher algorithm can be implemented in hybrid encryption project
to make data secure and better....”Published 2010
Get full text
Get full text
Undergraduates Project Papers
5
by Charomie, Tat Wi
Published 2010
“... which is encrypted and be decrypted to its readable form.As a conclusion,Caesar cipher algorithm can...”Published 2010
Get full text
Get full text
Get full text
Undergraduates Project Papers
6
7
8
by AlDabbagh, Sufyan Salim Mahmood, Alshaikhli, Imad Fakhri Taha, Al-Enezi, Khalid Abdulkareem, Alyaqoup, Mohammed Jasem
Published 2015
“...Lightweight block cipher algorithms are vital
for constrained environment. There are three factors...”Published 2015
Get full text
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
9
“...Lightweight block cipher algorithms are very important for constraint environment. This paper...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article
10
“... implementation speed and not introducing error propagation. The stream cipher algorithms evaluated are based...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article
11
12
13
by Mahdi, Reyadh H
Published 2009
“... generator in a stream cipher algorithm. The proposed random key generator is simply designed to produce a...”Published 2009
Get full text
Get full text
Get full text
Thesis
14
Published 1996
Table of Contents:
“...A Faster Algorithm for Approximate String Matching / Ricardo Baeza-Yates and Gonzalo Navarro...”
Book
15
by Pour, Davood Rezaei, Md. Said, Mohamad Rushdan, Mohd Atan, Kamel Ariffin, Othman, Mohamed
Published 2009
“....
Approach: The cipher algorithm was a 16-round Feistel network with a bijective function f and was made up...”Published 2009
Get full text
Get full text
Get full text
Article
16
“...SNOW 3G is a stream cipher algorithm used as encryption algorithm in third generation mobile phone...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article
17
by Shameri, Ahmad Zuri
Published 2006
“... respectively. For confidentiality, stream cipher algorithm used is based on the linear feedback register (LFSR...”Published 2006
Get full text
Get full text
Monograph
18
“... cryptography system. Advanced Encryption Standard (AES) is a symmetric block cipher algorithm that passed...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article
19
by Khalaf, Emad T
Published 2012
“...,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key...”Published 2012
Get full text
Get full text
Get full text
Undergraduates Project Papers
20
by Mohd Ali, Fakariah Hani
Published 2009
“... of this new 128-bit block cipher algorithm
will increase the protection of the national information...”Published 2009
Get full text
Get full text
Thesis


