يعرض 1 - 17 نتائج من 17 نتيجة بحث عن 'encryption algorithm based', وقت الاستعلام: 0.05s تنقيح النتائج
  1. 1
  2. 2

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group حسب Iqtadar Hussain (14147850)

    منشور في 2023
    "…<p dir="ltr">There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. …"
  3. 3

    A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes حسب Temadher Alassiry Al-Maadeed (14147847)

    منشور في 2022
    "…<p>We have proposed a robust, secure and efficient image encryption algorithm based on chaotic maps and algebraic structure. …"
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment حسب Zakaria Tolba (16904718)

    منشور في 2022
    "…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"
  10. 10

    A hybrid cryptosystem based on WEP for 802.11 networks حسب Haraty, Ramzi A.

    منشور في 2006
    "…It is a protocol that is based on symmetric-key encryption algorithm RC4 (Rivest Cipher 4). …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 11

    New Dimensions for Physical Layer Secret Key Generation: Excursion Lengths-Based Key Generation حسب Muhammad Adil (4899082)

    منشور في 2024
    "…The practical PLSKG algorithms (level-crossing algorithms) extract a secret key by analyzing the channel samples and assigning bit sequences to the channel samples lying in different quantization regions. …"
  12. 12

    Improving the security of SNMP in wireless networks حسب Otrok, H.

    منشور في 2017
    "…Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  13. 13
  14. 14

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
  15. 15

    Secure and Anonymous Communications Over Delay Tolerant Networks حسب Spiridon Bakiras (16896408)

    منشور في 2020
    "…We propose two different approaches for encrypting the exchanged messages. The first one is based solely on public key cryptosystems and is, thus, suitable for short, SMS-style messaging. …"
  16. 16

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method حسب Shahid Rahman (16904613)

    منشور في 2022
    "…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. In this paper, we proposed a novel technique in steganography within the digital images such is RGB, Gray Scale, Texture, Aerial images to achieve higher security, imperceptibility, capacity, and robustness as compared with existing methods. …"
  17. 17

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures حسب JUMA, MAZEN GHAZI

    منشور في 2021
    "…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …"
    احصل على النص الكامل