Search alternatives:
conquer algorithm » computer algorithms, control algorithm
cipher algorithm » filter algorithm, linear algorithm, faster algorithm
1
...Lightweight block cipher algorithms are vital for constrained environment. There are many...
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
2
...Lightweight block cipher algorithms are vital for constrained environment. It is easy to propose...
Get full text
Get full text
Get full text
Conference or Workshop Item
3
... will determine the performance of an algorithm. A Divide-and-Conquer algorithm is the most efficient algorithm...
Get full text
Get full text
Get full text
Article
4
5
...Lightweight block cipher algorithms are very important for constraint environment. This paper...
Get full text
Get full text
Get full text
Article
6
... implementation speed and not introducing error propagation. The stream cipher algorithms evaluated are based...
Get full text
Get full text
Get full text
Get full text
Article
7
by Tat Wi, Charomie
Published 2010
..., Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better....
Get full text
Get full text
Undergraduates Project Papers
8
by Charomie, Tat Wi
Published 2010
... which is encrypted and be decrypted to its readable form.As a conclusion,Caesar cipher algorithm can...
Get full text
Get full text
Get full text
Undergraduates Project Papers
9
by Al Noman, Abdullah
Published 2007
... through communication networks. The hardware implementation of cryptographic algorithms plays an important...
Get full text
Get full text
Thesis
10
11
12
...A hybrid algorithm is an algorithm that combines two or more other algorithms that solve the same...
Get full text
Conference or Workshop Item
13
...The development of Clonal Selection Algorithm (CSA) is inspired by elements from clonal selection...
Get full text
Get full text
Conference or Workshop Item
14
15
16
by Coutinho, S. C.
Published 1999
Table of Contents: ...Introduction -- 1. Fundamental algorithms -- 2. Unique factorization -- 3. Prime numbers -- 4...
Book
17
by Mohsin, Alla Talib
Published 2013
... is selected to hide the secret data. (ii) The secret message is encrypted by using the Affine Cipher. (iii...
Get full text
Get full text
Get full text
Thesis
18
by Brassard, Gilles, 1955-
Published 1988
Table of Contents: ...1. Preliminaries -- 2. Analysing the efficiency of algorithms -- 3. Greedy algorithms -- 4. Divide...
Book
19
by Hardy, Darel W.
Published 2003
Book
20
by Mohd Ali, Fakariah Hani
Published 2009
... up with a new 128-bit block cipher cryptographic algorithm which shall meet the security...
Get full text
Get full text
Thesis