A performance improvement of Domosi’s cryptosystem
Dӧmӧsi’s cryptosystem [2, 3] is a new stream cipher based on finite automata. The cryptosystem uses specific deterministic finite accepters as secret keys for the encryption and decryption. Though this cryptosystem has been proven to be secure against different standard attacks (see [8]), the propos...
| Main Authors: | Khaleel, Ghassan, Turaev, Sherzod, Mohd Tamrin, Mohd Izzuddin, Alshaikhli, Imad Fakhri Taha |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2015
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/44904/ http://irep.iium.edu.my/44904/1/piamse_paper.pdf |
Similar Items
A performance improvement of Dömösi’s cryptosystem
by: Khaleel, Ghassan, et al.
Published: (2016)
by: Khaleel, Ghassan, et al.
Published: (2016)
Performance and security improvements of Dӧmӧsi’s cryptosystem
by: Khaleel, Ghassan, et al.
Published: (2016)
by: Khaleel, Ghassan, et al.
Published: (2016)
An overview of cryptosystems based on finite automata
by: Khaleel, Ghassan, et al.
Published: (2016)
by: Khaleel, Ghassan, et al.
Published: (2016)
A comparative performance analysis of modified Dӧmӧsi’s cryptosystem and data encryption standard
by: Khaleel, Ghassan, et al.
Published: (2017)
by: Khaleel, Ghassan, et al.
Published: (2017)
A symmetric cryptosystem based on nondeterministic finite automata
by: Khaleel, Ghassan, et al.
Published: (2017)
by: Khaleel, Ghassan, et al.
Published: (2017)
A new block cipher based on finite automata systems
by: Khaleel, Ghassan, et al.
Published: (2016)
by: Khaleel, Ghassan, et al.
Published: (2016)
On the security of golden cryptosystems
by: Tahghighi, Muhammad, et al.
Published: (2012)
by: Tahghighi, Muhammad, et al.
Published: (2012)
Nonlinear consensus for multi-agent systems using positive intractions of doubly stochastic quadratic operators
by: Abdulghafor, Rawad, et al.
Published: (2016)
by: Abdulghafor, Rawad, et al.
Published: (2016)
Reach a nonlinear consensus for MAS via doubly stochastic quadratic operators
by: Abdulghafor, Rawad Abdulkhaleq Abdulmolla, et al.
Published: (2017)
by: Abdulghafor, Rawad Abdulkhaleq Abdulmolla, et al.
Published: (2017)
Computational properties of Watson-Crick context-free grammars
by: Mohamad Zulkufli, Nurul Liyana, et al.
Published: (2016)
by: Mohamad Zulkufli, Nurul Liyana, et al.
Published: (2016)
An improved genetic algorithm for solving the multiprocessor scheduling problem
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Multiset controlled grammars: A normal form and closure properties
by: Ashaari, Salbiah, et al.
Published: (2017)
by: Ashaari, Salbiah, et al.
Published: (2017)
Multiset controlled grammars
by: Ashaari, Salbiah, et al.
Published: (2017)
by: Ashaari, Salbiah, et al.
Published: (2017)
Image quality improvement
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Watson–Crick context-free grammars: Grammar simplifications and a parsing algorithm
by: Mohamad Zulkufli, Nurul Liyana, et al.
Published: (2018)
by: Mohamad Zulkufli, Nurul Liyana, et al.
Published: (2018)
A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC)
by: Taha, Imad, et al.
Published: (1999)
by: Taha, Imad, et al.
Published: (1999)
Effectiveness and performance of e-government in Saudi Arabia
by: Taha Alshaikhli, Haifa, et al.
Published: (2017)
by: Taha Alshaikhli, Haifa, et al.
Published: (2017)
Improving PRESENT lightweight algorithms
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
Brain & heart from computer science perspective
by: Taha Alshaikhli, Imad Fakhri
Published: (2014)
by: Taha Alshaikhli, Imad Fakhri
Published: (2014)
Scientific research in view of Quran and the creation of Allah s.w.t.
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
Scientific research in view of Quran and the creation of Allah s w t
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
Structure of research proposal
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
A practical method for the analysis of genetic algorithms
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
Nonterminal complexity of weakly conditional grammars
by: Turaev, Sherzod, et al.
Published: (2014)
by: Turaev, Sherzod, et al.
Published: (2014)
Improving the security of LBlock lightweight algorithm using bit permutation
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
Weighted Watson-crick automata and applications in halal authentication
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2016)
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2016)
Weighted Watson-Crick Automata
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2013)
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2013)
Weighted Watson-Crick automata
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2014)
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2014)
Dynamic linear feedback shift registers: a review
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Accident detection system and method for accident detection
by: Alkandari, Abdulrahman, et al.
Published: (2014)
by: Alkandari, Abdulrahman, et al.
Published: (2014)
Design and analysis of a new hash function gear
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
A review of steganographic methods and techniques
by: Beroual, Abdessalam, et al.
Published: (2018)
by: Beroual, Abdessalam, et al.
Published: (2018)
Dynamic fuzzy logic traffic light integrated system with accident detection and action
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
Minimum capabilities and requirements for establishing a national cert for AGC
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
Protection of the digital holy Quran using IT techniques
by: Alahmad, Mohammad, et al.
Published: (2017)
by: Alahmad, Mohammad, et al.
Published: (2017)
MOIM: a novel design of cryptographic hash function
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Designing a smart city in Kuwait: an initial study
by: Alkandari, Abdulrahman, et al.
Published: (2012)
by: Alkandari, Abdulrahman, et al.
Published: (2012)
Protection of the digital holy Quran using SAB hash function
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
Comparative study on 4G/LTE cryptographic algorithms based on different factors
by: Ghanim, Alyaa, et al.
Published: (2014)
by: Ghanim, Alyaa, et al.
Published: (2014)
Similar Items
-
A performance improvement of Dömösi’s cryptosystem
by: Khaleel, Ghassan, et al.
Published: (2016) -
Performance and security improvements of Dӧmӧsi’s cryptosystem
by: Khaleel, Ghassan, et al.
Published: (2016) -
An overview of cryptosystems based on finite automata
by: Khaleel, Ghassan, et al.
Published: (2016) -
A comparative performance analysis of modified Dӧmӧsi’s cryptosystem and data encryption standard
by: Khaleel, Ghassan, et al.
Published: (2017) -
A symmetric cryptosystem based on nondeterministic finite automata
by: Khaleel, Ghassan, et al.
Published: (2017)