Suggested Topics within your search.
Suggested Topics within your search.
1
“...Lightweight block cipher algorithms are vital for constrained environment. There are many...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
2
“...Lightweight block cipher algorithms are vital for
constrained environment. It is easy to propose...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
3
4
“...Lightweight block cipher algorithms are very important for constraint environment. This paper...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article
5
“... implementation speed and not introducing error propagation. The stream cipher algorithms evaluated are based...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article
6
by Tat Wi, Charomie
Published 2010
“..., Caesar cipher algorithm can be implemented in hybrid encryption project
to make data secure and better....”Published 2010
Get full text
Get full text
Undergraduates Project Papers
7
by Charomie, Tat Wi
Published 2010
“... which is encrypted and be decrypted to its readable form.As a conclusion,Caesar cipher algorithm can...”Published 2010
Get full text
Get full text
Get full text
Undergraduates Project Papers
8
by Al Noman, Abdullah
Published 2007
“... through communication networks. The hardware implementation of cryptographic algorithms plays an important...”Published 2007
Get full text
Get full text
Thesis
9
10
by AlDabbagh, Sufyan Salim Mahmood, Alshaikhli, Imad Fakhri Taha, Al-Enezi, Khalid Abdulkareem, Alyaqoup, Mohammed Jasem
Published 2015
“...Lightweight block cipher algorithms are vital
for constrained environment. There are three factors...”Published 2015
Get full text
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
11
“...A hybrid algorithm is an algorithm that combines two or more other algorithms that solve the same...”
Get full text
Get full text
Conference or Workshop Item
12
by Ahmad, Badrisham, Maarof, Mohd. Aizaini, Ibrahim, Subariah, Kutty Mammi, Hazinah, Mohamed Amin, Muhalim, Z'aba, Muhammad Reza
Published 2006
“...The development of Clonal Selection Algorithm (CSA) is inspired by elements from clonal selection...”Published 2006
Get full text
Get full text
Conference or Workshop Item
13
14
15
by Coutinho, S. C.
Published 1999
Table of Contents:
“...Introduction -- 1. Fundamental algorithms -- 2. Unique factorization -- 3. Prime numbers -- 4...”Published 1999
Book
16
by Mohsin, Alla Talib
Published 2013
“... is selected to hide the secret data. (ii) The secret message is encrypted by using the Affine Cipher. (iii...”Published 2013
Get full text
Get full text
Get full text
Thesis
17
18
by Mohd Ali, Fakariah Hani
Published 2009
“... up with a new 128-bit block cipher cryptographic algorithm
which shall meet the security...”Published 2009
Get full text
Get full text
Thesis
19
by Ariffin, Suriyani
Published 2012
“... of the systems or of data transfers. Symmetric encryption block cipher is an important cryptographic algorithm...”Published 2012
Get full text
Get full text
Thesis
20
“... communication networks. The hardware implementation of cryptographic algorithms plays an important role because...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article


