Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
conquer algorithm » computer algorithms, control algorithm
cipher algorithm » filter algorithm, linear algorithm, faster algorithm
conquer algorithm » computer algorithms, control algorithm
cipher algorithm » filter algorithm, linear algorithm, faster algorithm
1
“...Lightweight block cipher algorithms are vital for constrained environment. There are many...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
2
“...Lightweight block cipher algorithms are vital for
constrained environment. It is easy to propose...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
3
“... will determine the performance of an algorithm. A Divide-and-Conquer algorithm is the most efficient algorithm...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article
4
5
“...Lightweight block cipher algorithms are very important for constraint environment. This paper...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article
6
“... implementation speed and not introducing error propagation. The stream cipher algorithms evaluated are based...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article
7
by Tat Wi, Charomie
Published 2010
“..., Caesar cipher algorithm can be implemented in hybrid encryption project
to make data secure and better....”Published 2010
Get full text
Get full text
Undergraduates Project Papers
8
by Charomie, Tat Wi
Published 2010
“... which is encrypted and be decrypted to its readable form.As a conclusion,Caesar cipher algorithm can...”Published 2010
Get full text
Get full text
Get full text
Undergraduates Project Papers
9
by Al Noman, Abdullah
Published 2007
“... through communication networks. The hardware implementation of cryptographic algorithms plays an important...”Published 2007
Get full text
Get full text
Thesis
10
11
by AlDabbagh, Sufyan Salim Mahmood, Alshaikhli, Imad Fakhri Taha, Al-Enezi, Khalid Abdulkareem, Alyaqoup, Mohammed Jasem
Published 2015
“...Lightweight block cipher algorithms are vital
for constrained environment. There are three factors...”Published 2015
Get full text
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
12
“...A hybrid algorithm is an algorithm that combines two or more other algorithms that solve the same...”
Get full text
Get full text
Conference or Workshop Item
13
by Ahmad, Badrisham, Maarof, Mohd. Aizaini, Ibrahim, Subariah, Kutty Mammi, Hazinah, Mohamed Amin, Muhalim, Z'aba, Muhammad Reza
Published 2006
“...The development of Clonal Selection Algorithm (CSA) is inspired by elements from clonal selection...”Published 2006
Get full text
Get full text
Conference or Workshop Item
14
15
16
by Coutinho, S. C.
Published 1999
Table of Contents:
“...Introduction -- 1. Fundamental algorithms -- 2. Unique factorization -- 3. Prime numbers -- 4...”Published 1999
Book
17
by Mohsin, Alla Talib
Published 2013
“... is selected to hide the secret data. (ii) The secret message is encrypted by using the Affine Cipher. (iii...”Published 2013
Get full text
Get full text
Get full text
Thesis
18
by Brassard, Gilles, 1955-
Published 1988
Table of Contents:
“...1. Preliminaries -- 2. Analysing the efficiency of algorithms -- 3. Greedy algorithms -- 4. Divide...”Published 1988
Book
19
20
by Mohd Ali, Fakariah Hani
Published 2009
“... up with a new 128-bit block cipher cryptographic algorithm
which shall meet the security...”Published 2009
Get full text
Get full text
Thesis


