Search alternatives:
cipher algorithm » filter algorithm, linear algorithm, faster algorithm
1
...Lightweight block cipher algorithms are vital for constrained environment. There are many...
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
2
...Lightweight block cipher algorithms are vital for constrained environment. It is easy to propose...
Get full text
Get full text
Get full text
Conference or Workshop Item
3
4
...Lightweight block cipher algorithms are very important for constraint environment. This paper...
Get full text
Get full text
Get full text
Article
5
... implementation speed and not introducing error propagation. The stream cipher algorithms evaluated are based...
Get full text
Get full text
Get full text
Get full text
Article
6
by Tat Wi, Charomie
Published 2010
..., Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better....
Get full text
Get full text
Undergraduates Project Papers
7
by Charomie, Tat Wi
Published 2010
... which is encrypted and be decrypted to its readable form.As a conclusion,Caesar cipher algorithm can...
Get full text
Get full text
Get full text
Undergraduates Project Papers
8
by Al Noman, Abdullah
Published 2007
... through communication networks. The hardware implementation of cryptographic algorithms plays an important...
Get full text
Get full text
Thesis
9
10
11
...A hybrid algorithm is an algorithm that combines two or more other algorithms that solve the same...
Get full text
Conference or Workshop Item
12
...The development of Clonal Selection Algorithm (CSA) is inspired by elements from clonal selection...
Get full text
Get full text
Conference or Workshop Item
13
14
15
by Coutinho, S. C.
Published 1999
Table of Contents: ...Introduction -- 1. Fundamental algorithms -- 2. Unique factorization -- 3. Prime numbers -- 4...
Book
16
by Mohsin, Alla Talib
Published 2013
... is selected to hide the secret data. (ii) The secret message is encrypted by using the Affine Cipher. (iii...
Get full text
Get full text
Get full text
Thesis
17
by Hardy, Darel W.
Published 2003
Book
18
by Mohd Ali, Fakariah Hani
Published 2009
... up with a new 128-bit block cipher cryptographic algorithm which shall meet the security...
Get full text
Get full text
Thesis
19
by Ariffin, Suriyani
Published 2012
... of the systems or of data transfers. Symmetric encryption block cipher is an important cryptographic algorithm...
Get full text
Get full text
Thesis
20
... communication networks. The hardware implementation of cryptographic algorithms plays an important role because...
Get full text
Get full text
Get full text
Article