Search alternatives:
"conquer algorithm." » "computer algorithms.", "control algorithm."
"cipher algorithm." » "filter algorithm.", "faster algorithm."
"linear algorithm." » "line algorithms."
1
...Lightweight block cipher algorithms are vital for constrained environment. There are many...
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
2
...Lightweight block cipher algorithms are vital for constrained environment. It is easy to propose...
Get full text
Get full text
Get full text
Conference or Workshop Item
3
... will determine the performance of an algorithm. A Divide-and-Conquer algorithm is the most efficient algorithm...
Get full text
Get full text
Get full text
Article
4
by Tat Wi, Charomie
Published 2010
..., Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better....
Get full text
Get full text
Undergraduates Project Papers
5
by Charomie, Tat Wi
Published 2010
... which is encrypted and be decrypted to its readable form.As a conclusion,Caesar cipher algorithm can...
Get full text
Get full text
Get full text
Undergraduates Project Papers
6
7
8
9
...Lightweight block cipher algorithms are very important for constraint environment. This paper...
Get full text
Get full text
Get full text
Article
10
... implementation speed and not introducing error propagation. The stream cipher algorithms evaluated are based...
Get full text
Get full text
Get full text
Get full text
Article
11
12
13
14
15
16
17
by Jones, Neil C.
Published 2004
Table of Contents: ...Divide-and-conquer algorithms --...
Book
18
Published 1984
Table of Contents: ...Linear algorithms for convex drawings of planar graphs /...
Book
19
Published 1985
Table of Contents: ...A linear algorithm for topological bandwidth in degree three trees /...
Book
20
by Mahdi, Reyadh H
Published 2009
... generator in a stream cipher algorithm. The proposed random key generator is simply designed to produce a...
Get full text
Get full text
Get full text
Thesis