Self-invertible key on Cipher Polygraphic Polyfunction with eigen matrix based IMIE
Hill Cipher’s System and its modifications are still practiced mainly in sending a secret message involving images. One drawback that the recipient of the message is trying to overcome is to get the decryption key from the cipher text to plain text during the decryption process. Previous studies hav...
| Main Authors: | Yunos, Faridah, Ayub, Nur Aqilah Fakhira, Mohammad Rasyidi, Nurul Fatin Atiqa, Asbullah, Muhammad Asyraf |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Penerbit Universiti Malaysia Perlis
2024
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/117222/ http://psasir.upm.edu.my/id/eprint/117222/1/117222.pdf |
Similar Items
Effect of self-invertible matrix on cipher hexagraphic polyfunction
by: Lin, Sally Pei Ching, et al.
Published: (2019)
by: Lin, Sally Pei Ching, et al.
Published: (2019)
Exploring self-invertible 3×3 matrices for cipher trigraphic polyfunction with distinct encryption keys
by: Yunos, Faridah, et al.
Published: (2024)
by: Yunos, Faridah, et al.
Published: (2024)
Biometric Template Protection based on Hill Cipher Algorithm with Two Invertible Keys
by: Khalaf, Emad Taha, et al.
Published: (2018)
by: Khalaf, Emad Taha, et al.
Published: (2018)
The post-conviction polygraph in forensic practice
by: Elliott, Elizabeth
Published: (2017)
by: Elliott, Elizabeth
Published: (2017)
Terima tauliah IMI
by: Suliati, Asri
Published: (2024)
by: Suliati, Asri
Published: (2024)
Polygraphic Counterproductive Behavior Index Profiling System
by: Yusoff, Hashim, et al.
Published: (2006)
by: Yusoff, Hashim, et al.
Published: (2006)
Key-dependent s-box in lightweight block ciphers
by: AlDabbagh, S.S.M., et al.
Published: (2014)
by: AlDabbagh, S.S.M., et al.
Published: (2014)
The utility of post-conviction polygraph testing among sexual offenders
by: Elliott, Elizabeth, et al.
Published: (2016)
by: Elliott, Elizabeth, et al.
Published: (2016)
Polygraph-assessment test for pre employment of information technology personnel
by: Yusoff, Hashim
Published: (2001)
by: Yusoff, Hashim
Published: (2001)
Modified key size determination models for symmetric ciphers
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Dynamic determinant matrix-based block cipher algorithm
by: Juremi, Julia
Published: (2018)
by: Juremi, Julia
Published: (2018)
Development of DNA-based dynamic key-dependent block cipher
by: Saeed, Auday H.
Published: (2015)
by: Saeed, Auday H.
Published: (2015)
Eigen-transitions in cantilever cylindrical shells subjected to vertical edge loads
by: Coman, Ciprian D., et al.
Published: (2018)
by: Coman, Ciprian D., et al.
Published: (2018)
Study of Near Consensus Complex Social Networks Using Eigen Theory
by: Ling, B., et al.
Published: (2011)
by: Ling, B., et al.
Published: (2011)
Blind digital speech watermarking based on Eigen-value quantization in DWT
by: Nematollahi, Mohammad Ali, et al.
Published: (2015)
by: Nematollahi, Mohammad Ali, et al.
Published: (2015)
Key dependent dynamic S-Boxes on 3D cellular automata for block cipher
by: Md Yasin, Sharifah, et al.
Published: (2020)
by: Md Yasin, Sharifah, et al.
Published: (2020)
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
by: Hassan Disina, Abdulkadir
Published: (2018)
by: Hassan Disina, Abdulkadir
Published: (2018)
An embedded cryptosystem implementing symmetric cipher and public-key crypto algorithms in hardware
by: Hau, Yuan Wen
Published: (2005)
by: Hau, Yuan Wen
Published: (2005)
Hydroelastic Stability of a Flexible Panel: Eigen-Analysis and Time-Domain Response
by: Tan, Ben Hoea, et al.
Published: (2010)
by: Tan, Ben Hoea, et al.
Published: (2010)
UMPSA receives IMI Accreditation as a Hybrid and Electric Vehicle Training Centre
by: Mimi Rabita, Abd Wahit
Published: (2024)
by: Mimi Rabita, Abd Wahit
Published: (2024)
A study of caesar cipher and transposition cipher in jawi messages
by: Mohd Lokman, Syiham, et al.
Published: (2018)
by: Mohd Lokman, Syiham, et al.
Published: (2018)
Long-wavelength Discrepancies Between the Australian Gravity Field and EIGEN-2 CHAMP Data
by: Featherstone, Will
Published: (2005)
by: Featherstone, Will
Published: (2005)
Eigen-analysis of an inviscid channel flow with a finite flexible plate in one wall
by: Burke, M., et al.
Published: (2014)
by: Burke, M., et al.
Published: (2014)
UMPSA terima pentauliahan IMI sebagai pusat latihan kenderaan hibrid dan elektrik
by: Mimi Rabita, Abd Wahit
Published: (2024)
by: Mimi Rabita, Abd Wahit
Published: (2024)
Polyalphabetic substitution cipher
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Monoalphabetic substitution cipher
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Block and stream cipher
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Extracting Single Trial Visual Evoked Potentials using Selective Eigen-Rate Principal Components
by: Andrews, , Samraj, et al.
Published: (2005)
by: Andrews, , Samraj, et al.
Published: (2005)
Extracting single trial visual evoked potentials using selective eigen-rate principal components
by: Andrews, S, S, et al.
Published: (2005)
by: Andrews, S, S, et al.
Published: (2005)
Sequential phosphine-catalyzed, nucleophilic thiol ene/radical-mediated thiol-yne reactions and the facile orthogonal synthesis of polyfunctional materials
by: Chan, J., et al.
Published: (2009)
by: Chan, J., et al.
Published: (2009)
Factor analysis in itaconic acid fermentation using filtered POME by
aspergillus terreus IMI 282743
by: Jamaliah Md. Jahim,, et al.
Published: (2006)
by: Jamaliah Md. Jahim,, et al.
Published: (2006)
Trivium and Rabbit stream cipher
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Death penalty as deterrence for crimes / Hasmahani Hassan Hadeli, Imi Safwani Ismail and Karmuni Abdul Kadir
by: Hassan Hadeli, Hasmahani, et al.
Published: (2006)
by: Hassan Hadeli, Hasmahani, et al.
Published: (2006)
Stability of the Intrinsic Motivation Inventory (IMI) for the use of Malaysian form one students in ICT literacy class.
by: Eow, Yee Leng, et al.
Published: (2010)
by: Eow, Yee Leng, et al.
Published: (2010)
Enhancement of lightweight block cipher algorithms
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
New directions in cryptanalysis of block ciphers.
by: RezaeiPour , Davood, et al.
Published: (2009)
by: RezaeiPour , Davood, et al.
Published: (2009)
Mathematical aspects of selected block ciphers
by: Alqarni, Yazeed Saeed
Published: (2015)
by: Alqarni, Yazeed Saeed
Published: (2015)
An upgrade on the key generation algorithm of the GGH-MKA lattice-based encryption scheme
by: Arif, Mandangan, et al.
Published: (2021)
by: Arif, Mandangan, et al.
Published: (2021)
The Blömer-May’s weak key revisited
by: Mohd Tahir, Rasyid Redha, et al.
Published: (2019)
by: Mohd Tahir, Rasyid Redha, et al.
Published: (2019)
Square integer matrix with a single non-integer entry in its inverse
by: Mandangan, Arif, et al.
Published: (2021)
by: Mandangan, Arif, et al.
Published: (2021)
Similar Items
-
Effect of self-invertible matrix on cipher hexagraphic polyfunction
by: Lin, Sally Pei Ching, et al.
Published: (2019) -
Exploring self-invertible 3×3 matrices for cipher trigraphic polyfunction with distinct encryption keys
by: Yunos, Faridah, et al.
Published: (2024) -
Biometric Template Protection based on Hill Cipher Algorithm with Two Invertible Keys
by: Khalaf, Emad Taha, et al.
Published: (2018) -
The post-conviction polygraph in forensic practice
by: Elliott, Elizabeth
Published: (2017) -
Terima tauliah IMI
by: Suliati, Asri
Published: (2024)