-
1
Security testing and evaluation of cryptography algorithms. (c2003)
Published 2003Get full text
Get full text
masterThesis -
2
-
3
A Comprehensive Analysis of Security-Based Schemes in Underwater Wireless Sensor Networks
Published 2023Subjects: -
4
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
Published 2023“…<p dir="ltr">There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. …”
-
5
A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes
Published 2022“…<p>We have proposed a robust, secure and efficient image encryption algorithm based on chaotic maps and algebraic structure. …”
-
6
Left Ventricular Wall Motion Estimation by Active Polynomials for Acute Myocardial Infarction Detection
Published 2020“…The proposed algorithm quantifies the true wall motion occurring in LV wall segments so as to assist cardiologists diagnose early signs of an acute MI. …”
-
7
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
Published 2022“…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
-
8
Scrambled Prime Key Encryption
Published 2018“…Nevertheless, but the fast increase in computers' speed may threaten these algorithms. This paper presents an innovative symmetric encryption, which we call Scrambled Prime Key Encryption or SPKE that tries to heighten the level of communication security. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
9
Axes-Based Encryption Key
Published 2018Get full text
Get full text
Get full text
Get full text
conferenceObject -
10
A novel linear time corner detection algorithm
Published 2005“…We have presented a novel scheme for detecting corners of a planner object SRM05. The core of the algorithm is based upon slope analysis. …”
Get full text
Get full text
article -
11
Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique
Published 2024“…The research aims to use the elliptic-curve cryptography (ECC) encryption algorithm for storing the seed phrase online by encrypting the seed phrase and using the splitting technique to store the crypto wallet seed phrase. …”
-
12
-
13
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
Published 2019“…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …”
-
14
Hardening the ElGamal cryptosystem in the setting of the second group of units. (c2011)
Published 2011Get full text
Get full text
masterThesis -
15
Improving the security of SNMP in wireless networks
Published 2017“…SNMPv1 and v2 do not provide security when managing agents. Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
16
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
17
Secure and Anonymous Communications Over Delay Tolerant Networks
Published 2020“…Instead, our work introduces a novel message forwarding algorithm that delivers messages, from source to destination, via a random walk process. …”
-
18
-
19
Improving the Secure Socket Layer Protocol by modifying its Authentication function
Published 2017“…The most common cryptographic algorithm used for this function is RSA. If we double the key length in RSA to have more secure communication, then it is known that the time needed for the encryption and decryption will be increased approximately eight times. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
20
A hybrid cryptosystem based on WEP for 802.11 networks. (c2006)
Published 2006Get full text
Get full text
masterThesis