Challenges in data representation for efficient execution of encryption operation
Big number operation has always been a bottleneck to computer system as it imposes high demand on computing power. With a limited power available, operations such as exponentiation and multiplication involving large integer belonging to encryption process requires grave scrutiny. One way to address...
| Main Authors: | Afendee Mohamed, Mohamad, Garba Shawai, Yahaya, Almaiah, Mohammed Amin, Derahman, Mohd Noor, Lutfi, Abdalwali, Abu Bakar, Khairul Azmi |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Institute of Advanced Engineering and Science
2024
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/111151/ http://psasir.upm.edu.my/id/eprint/111151/1/Challenges_in_data_representation_for_efficient_ex.pdf |
Similar Items
Hardware prototyping of an efficient encryption engine
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2010)
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2010)
Hardware prototyping of an efficient encryption engine
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2009)
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2009)
A parallel XTS encryption mode of operation
by: Alomari, Mohammad Ahmed, et al.
Published: (2009)
by: Alomari, Mohammad Ahmed, et al.
Published: (2009)
Implementation of a parallel XTS encryption mode of operation
by: Alomari, Mohammad Ahmed, et al.
Published: (2014)
by: Alomari, Mohammad Ahmed, et al.
Published: (2014)
Understanding the planning process and challenges in Shariah audit execution: the case of Malaysian takaful operators
by: Abdullah, Nurdianawati Irwani, et al.
Published: (2019)
by: Abdullah, Nurdianawati Irwani, et al.
Published: (2019)
Data Encryption Standard (DES)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Novel framework for hidden data in the image page within
executable file using computation between advanced encryption standard and distortion techniques
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Towards virtuous cloud data storage using access policy hiding in ciphertext policy attribute-based encryption
by: Mohd Satar, Siti Dhalila, et al.
Published: (2021)
by: Mohd Satar, Siti Dhalila, et al.
Published: (2021)
Speed Efficient Hardware Implementation Of Advanced Encryption Standard (Aes)
by: Low, Chiau Thian
Published: (2017)
by: Low, Chiau Thian
Published: (2017)
Addition chain heuristics in application to elliptic curve cryptosystems
by: Mohamed, Mohamad Afendee, et al.
Published: (2024)
by: Mohamed, Mohamad Afendee, et al.
Published: (2024)
IoT data encryption algorithm for security
by: Kanaan Ismael, Marwan
Published: (2020)
by: Kanaan Ismael, Marwan
Published: (2020)
Rijndael encryption technique: authentication for computer application
by: Hamid Ali, Firkhan Ali, et al.
Published: (2020)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2020)
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
by: -, Salma, et al.
Published: (2019)
by: -, Salma, et al.
Published: (2019)
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
by: Lim, Mui Liang
Published: (2006)
by: Lim, Mui Liang
Published: (2006)
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
by: Mohammed Saleh, Mohammed Ahmed
Published: (2016)
by: Mohammed Saleh, Mohammed Ahmed
Published: (2016)
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
by: Mohammed Saleh, Mohammed Ahmed
Published: (2016)
by: Mohammed Saleh, Mohammed Ahmed
Published: (2016)
The block cipher algorithm–properties, encryption efficiency analysis and security evaluation
by: Rezaeipour, Davood, et al.
Published: (2010)
by: Rezaeipour, Davood, et al.
Published: (2010)
Security in robot operating system (ROS) by using Advanced Encryption Standard (AES)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
Efficient modeling and representation of agreement in interval-valued data
by: Havens, Timothy C., et al.
Published: (2017)
by: Havens, Timothy C., et al.
Published: (2017)
Challenges of hidden data in the unused area two within executable files
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
A New Image-Database Encryption Based on A Hybrid Approach of Data-at-Rest and Data-in-Motion Encryption Protocol.
by: Ooi, Bee Sien, et al.
Published: (2004)
by: Ooi, Bee Sien, et al.
Published: (2004)
Development of efficient t-way test data generation algorithm and execution strategies
by: Khandakar Fazley, Rabbi
Published: (2012)
by: Khandakar Fazley, Rabbi
Published: (2012)
Data encryption in e-counselling system (DEECS)
by: Athirah Fayyadhah, Othman
Published: (2009)
by: Athirah Fayyadhah, Othman
Published: (2009)
Chaotic asymmetric encryption process for data security.
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2008)
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2008)
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022)
by: Awadallah, Ruba N S
Published: (2022)
Analysis for McEliece and Niederreiter Encryptions: An Alternative to Public Key Encryption
by: Chaw, Lian Foong
Published: (2018)
by: Chaw, Lian Foong
Published: (2018)
Toward efficient attribute-based searchable encryption for access control over blockchain
by: Hussein, Al-Abadi Hassan Mansur
Published: (2021)
by: Hussein, Al-Abadi Hassan Mansur
Published: (2021)
Cloud-based secure healthcare framework by using enhanced ciphertext policy attribute-based encryption scheme
by: Mohd Satar, Siti Dhalila, et al.
Published: (2021)
by: Mohd Satar, Siti Dhalila, et al.
Published: (2021)
Encryption using FPGA
by: Nor Robaini, Ibrahim
Published: (2008)
by: Nor Robaini, Ibrahim
Published: (2008)
Image compression and encryption
by: Zainal Abidin, Zuhairiah
Published: (2003)
by: Zainal Abidin, Zuhairiah
Published: (2003)
Execution of micro-credentials in Malaysia: the challenges and readiness of higher education leaders
by: Md Rami, Ahmad Aizuddin, et al.
Published: (2023)
by: Md Rami, Ahmad Aizuddin, et al.
Published: (2023)
Enhancing selective encryption for H.264/AVC using advanced encryption standard
by: Abomhara, Mohamed, et al.
Published: (2010)
by: Abomhara, Mohamed, et al.
Published: (2010)
“Come you spirits unsex me!”: representations of the female executive in recent French film & fiction
by: Lane, Jeremy F.
Published: (2015)
by: Lane, Jeremy F.
Published: (2015)
Thermal noise generator and injector circuit for data encryption
by: Khan, Sheroz, et al.
Published: (2010)
by: Khan, Sheroz, et al.
Published: (2010)
Modified Data Encryption Standard Algorithm for Textbased Applications
by: Mohamed Khmag, Asem Ib.
Published: (2006)
by: Mohamed Khmag, Asem Ib.
Published: (2006)
Encrypting text data using elliptic curve cryptography
by: Ali, Abas Abdullahi
Published: (2018)
by: Ali, Abas Abdullahi
Published: (2018)
Video encryption using computation between H.264/AVC and AES encryption algorithm
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
An overview of video encryption techniques
by: Abomhara, Mohamed, et al.
Published: (2010)
by: Abomhara, Mohamed, et al.
Published: (2010)
Multimedia encryption, transmission and authentication
Published: (2011)
Published: (2011)
Advanced Encryption Standard (AES)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Similar Items
-
Hardware prototyping of an efficient encryption engine
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2010) -
Hardware prototyping of an efficient encryption engine
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2009) -
A parallel XTS encryption mode of operation
by: Alomari, Mohammad Ahmed, et al.
Published: (2009) -
Implementation of a parallel XTS encryption mode of operation
by: Alomari, Mohammad Ahmed, et al.
Published: (2014) -
Understanding the planning process and challenges in Shariah audit execution: the case of Malaysian takaful operators
by: Abdullah, Nurdianawati Irwani, et al.
Published: (2019)