Performance and security improvements of Dӧmӧsi’s cryptosystem
Dӧmӧsi’s cryptosystem (Dӧmӧsi’s, 2008; Dӧmӧsi, November 11–14, 2009) is a new stream cipher based on finite automata without outputs. The cryptosystem uses specific deterministic finite accepters as secret keys for the encryption and decryption. Though this cryptosystem has been proven to be secure...
| Main Authors: | Khaleel, Ghassan, Turaev, Sherzod, Mohd Tamrin, Mohd Izzuddin, Alshaikhli, Imad Fakhri Taha |
|---|---|
| Format: | Article |
| Language: | English English English |
| Published: |
CESER Publications
2016
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/50467/ http://irep.iium.edu.my/50467/1/P4-Performance.pdf http://irep.iium.edu.my/50467/4/50467_A%20performance%20improvement%20of%20D%C3%B6m%C3%B6si%27_Scopus.pdf http://irep.iium.edu.my/50467/10/50467-Performance%20and%20security%20improvements%20of%20D%D3%A7m%D3%A7si%E2%80%99s%20cryptosystem_WOS.pdf |
Similar Items
A comparative performance analysis of modified Dӧmӧsi’s cryptosystem and data encryption standard
by: Khaleel, Ghassan, et al.
Published: (2017)
by: Khaleel, Ghassan, et al.
Published: (2017)
A performance improvement of Domosi’s cryptosystem
by: Khaleel, Ghassan, et al.
Published: (2015)
by: Khaleel, Ghassan, et al.
Published: (2015)
An overview of cryptosystems based on finite automata
by: Khaleel, Ghassan, et al.
Published: (2016)
by: Khaleel, Ghassan, et al.
Published: (2016)
A performance improvement of Dömösi’s cryptosystem
by: Khaleel, Ghassan, et al.
Published: (2016)
by: Khaleel, Ghassan, et al.
Published: (2016)
A symmetric cryptosystem based on nondeterministic finite automata
by: Khaleel, Ghassan, et al.
Published: (2017)
by: Khaleel, Ghassan, et al.
Published: (2017)
A new block cipher based on finite automata systems
by: Khaleel, Ghassan, et al.
Published: (2016)
by: Khaleel, Ghassan, et al.
Published: (2016)
Generalizations of paralindelӧf property in bitopological spaces
by: Bouseliana, Hend Mohamed
Published: (2015)
by: Bouseliana, Hend Mohamed
Published: (2015)
On the security of golden cryptosystems
by: Tahghighi, Muhammad, et al.
Published: (2012)
by: Tahghighi, Muhammad, et al.
Published: (2012)
Development Of Fӧrster Resonance Energy Transfer Based Homogeneous Immunoassays For Determination Of (R)-Methadone
by: Ooi, May Yui
Published: (2016)
by: Ooi, May Yui
Published: (2016)
Computational properties of Watson-Crick context-free grammars
by: Mohamad Zulkufli, Nurul Liyana, et al.
Published: (2016)
by: Mohamad Zulkufli, Nurul Liyana, et al.
Published: (2016)
Network security setting
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Achieving security for images by LSB and MD5
by: Alahmad, Mohammad, et al.
Published: (2012)
by: Alahmad, Mohammad, et al.
Published: (2012)
Improving the security of LBlock lightweight algorithm using bit permutation
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
Nonlinear consensus for multi-agent systems using positive intractions of doubly stochastic quadratic operators
by: Abdulghafor, Rawad, et al.
Published: (2016)
by: Abdulghafor, Rawad, et al.
Published: (2016)
A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC)
by: Taha, Imad, et al.
Published: (1999)
by: Taha, Imad, et al.
Published: (1999)
Sistem Tuntutan Insuran SisTI / Kamariah Lamim
by: Kamariah, Lamim
Published: (2002)
by: Kamariah, Lamim
Published: (2002)
Reach a nonlinear consensus for MAS via doubly stochastic quadratic operators
by: Abdulghafor, Rawad Abdulkhaleq Abdulmolla, et al.
Published: (2017)
by: Abdulghafor, Rawad Abdulkhaleq Abdulmolla, et al.
Published: (2017)
Brain & heart from computer science perspective
by: Taha Alshaikhli, Imad Fakhri
Published: (2014)
by: Taha Alshaikhli, Imad Fakhri
Published: (2014)
Scientific research in view of Quran and the creation of Allah s.w.t.
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
Scientific research in view of Quran and the creation of Allah s w t
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
Structure of research proposal
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
A practical method for the analysis of genetic algorithms
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
Nonterminal complexity of weakly conditional grammars
by: Turaev, Sherzod, et al.
Published: (2014)
by: Turaev, Sherzod, et al.
Published: (2014)
Sistem Pengurusan Produk AVON (SisPA) / Rosziwati Roslan
by: Rosziwati , Roslan
Published: (2003)
by: Rosziwati , Roslan
Published: (2003)
Achieving security by combining Huffman and SLSB algorithms
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
Security risk analysis used by Kuwait government sectors
by: Al-Enezi , Khalid Abdulkareem, et al.
Published: (2014)
by: Al-Enezi , Khalid Abdulkareem, et al.
Published: (2014)
Weighted Watson-crick automata and applications in halal authentication
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2016)
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2016)
Weighted Watson-Crick Automata
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2013)
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2013)
Weighted Watson-Crick automata
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2014)
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2014)
Dynamic linear feedback shift registers: a review
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Accident detection system and method for accident detection
by: Alkandari, Abdulrahman, et al.
Published: (2014)
by: Alkandari, Abdulrahman, et al.
Published: (2014)
Design and analysis of a new hash function gear
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
A review of steganographic methods and techniques
by: Beroual, Abdessalam, et al.
Published: (2018)
by: Beroual, Abdessalam, et al.
Published: (2018)
Dynamic fuzzy logic traffic light integrated system with accident detection and action
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
Minimum capabilities and requirements for establishing a national cert for AGC
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
Effectiveness and performance of e-government in Saudi Arabia
by: Taha Alshaikhli, Haifa, et al.
Published: (2017)
by: Taha Alshaikhli, Haifa, et al.
Published: (2017)
Protection of the digital holy Quran using IT techniques
by: Alahmad, Mohammad, et al.
Published: (2017)
by: Alahmad, Mohammad, et al.
Published: (2017)
MOIM: a novel design of cryptographic hash function
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
An improved genetic algorithm for solving the multiprocessor scheduling problem
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Similar Items
-
A comparative performance analysis of modified Dӧmӧsi’s cryptosystem and data encryption standard
by: Khaleel, Ghassan, et al.
Published: (2017) -
A performance improvement of Domosi’s cryptosystem
by: Khaleel, Ghassan, et al.
Published: (2015) -
An overview of cryptosystems based on finite automata
by: Khaleel, Ghassan, et al.
Published: (2016) -
A performance improvement of Dömösi’s cryptosystem
by: Khaleel, Ghassan, et al.
Published: (2016) -
A symmetric cryptosystem based on nondeterministic finite automata
by: Khaleel, Ghassan, et al.
Published: (2017)