Message based random variable length key encryption algorithm.
Problem statement: A block ciphers provides confidentiality in cryptography but cryptanalysis of the classical block ciphers demonstrated some old weaknesses grabbing a partial key in any stage of encryption procedure leads to reconstructing the whole key. Exhaustive key search shows that key gener...
| Main Authors: | Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Science Publications
2009
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/15615/ http://psasir.upm.edu.my/id/eprint/15615/1/Message%20based%20random%20variable%20length%20key%20encryption%20algorithm.pdf |
Similar Items
Priority and random selection for dynamic window secured implicit geographic routing in wireless sensor network
by: Mohd Hanapi, Zurina, et al.
Published: (2009)
by: Mohd Hanapi, Zurina, et al.
Published: (2009)
Text messaging encryption system
by: Sundara Morthty, Nirmala Devi
Published: (2012)
by: Sundara Morthty, Nirmala Devi
Published: (2012)
The new variable-length key symmetric cryptosystem
by: Pour, Davood Rezaei, et al.
Published: (2009)
by: Pour, Davood Rezaei, et al.
Published: (2009)
Probing mechanism scheduling for connected coverage wireless sensor network.
by: Mahdavi, Mina, et al.
Published: (2011)
by: Mahdavi, Mina, et al.
Published: (2011)
An upgrade on the key generation algorithm of the GGH-MKA lattice-based encryption scheme
by: Arif, Mandangan, et al.
Published: (2021)
by: Arif, Mandangan, et al.
Published: (2021)
Analysis for McEliece and Niederreiter Encryptions: An Alternative to Public Key Encryption
by: Chaw, Lian Foong
Published: (2018)
by: Chaw, Lian Foong
Published: (2018)
Improving The Randomness of Output Sequence for The Advanced Encryption Standard Cryptographic Algorithm
by: Abdulbari Ali, Sherif
Published: (2005)
by: Abdulbari Ali, Sherif
Published: (2005)
The impact of window's size in DWSIGF routing protocol.
by: Mohd Hanapi, Zurina, et al.
Published: (2010)
by: Mohd Hanapi, Zurina, et al.
Published: (2010)
Key message 10: consume foods and beverages low in sugar
by: Rajikan, Roslee, et al.
Published: (2010)
by: Rajikan, Roslee, et al.
Published: (2010)
Image encryption algorithm based on chaotic mapping
by: Salleh, Mazleena, et al.
Published: (2003)
by: Salleh, Mazleena, et al.
Published: (2003)
Pairing-based public-key encryption schemes with backward-and-forward security
by: Han, Song, et al.
Published: (2008)
by: Han, Song, et al.
Published: (2008)
Key paediatric messages from Amsterdam
by: Grigg, J., et al.
Published: (2016)
by: Grigg, J., et al.
Published: (2016)
Video streaming and encrypting algorithms
by: Abumuala, Muhammad, et al.
Published: (2011)
by: Abumuala, Muhammad, et al.
Published: (2011)
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
by: Lim, Mui Liang
Published: (2006)
by: Lim, Mui Liang
Published: (2006)
Randomized text encryption: a new dimension in cryptography
by: Memon, Jamshed, et al.
Published: (2014)
by: Memon, Jamshed, et al.
Published: (2014)
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
by: Khor, Lay Hoong
Published: (2006)
by: Khor, Lay Hoong
Published: (2006)
#Drugsforsale: An exploration of the use of social media and encrypted messaging apps to supply and access drugs
by: Moyle, L., et al.
Published: (2019)
by: Moyle, L., et al.
Published: (2019)
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
by: Abu, Ahmad Zaidee
Published: (2008)
by: Abu, Ahmad Zaidee
Published: (2008)
FPGA implementation of RSA encryption engine with flexible key size
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2007)
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2007)
An improved chaotic image encryption algorithm
by: Al-Khasawneh, Mahmoud Ahmad, et al.
Published: (2018)
by: Al-Khasawneh, Mahmoud Ahmad, et al.
Published: (2018)
IoT data encryption algorithm for security
by: Kanaan Ismael, Marwan
Published: (2020)
by: Kanaan Ismael, Marwan
Published: (2020)
Video encryption using computation between H.264/AVC and AES encryption algorithm
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
Enhanced chaotic image encryption algorithm based on Baker's map
by: Salleh, Mazleena, et al.
Published: (2003)
by: Salleh, Mazleena, et al.
Published: (2003)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)
by: H. Belgassem, Seddeq
Published: (2004)
Cloud-based secure healthcare framework by using enhanced ciphertext policy attribute-based encryption scheme
by: Mohd Satar, Siti Dhalila, et al.
Published: (2021)
by: Mohd Satar, Siti Dhalila, et al.
Published: (2021)
Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control
by: Jamal, Fara, et al.
Published: (2020)
by: Jamal, Fara, et al.
Published: (2020)
Minimum message length clustering: an explication and some applications to vegetation data
by: Mucina, Ladislav, et al.
Published: (2001)
by: Mucina, Ladislav, et al.
Published: (2001)
Dynamic Bayesian Networks and Variable Length Genetic Algorithm for Dialogue Act Recognition
by: Ali Yahya, Anwar
Published: (2007)
by: Ali Yahya, Anwar
Published: (2007)
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
by: -, Salma, et al.
Published: (2019)
by: -, Salma, et al.
Published: (2019)
The hybrid cubes encryption algorithm (HiSea)
by: Jamel, Sapiāee
Published: (2012)
by: Jamel, Sapiāee
Published: (2012)
An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
Selective video encryption algorithm based on H.264/AVC and AES
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
Key message 4: eat adequate amount of rice, other cereal products (preferably whole grains) and tubers
by: Mamat, Nik Mazlan, et al.
Published: (2010)
by: Mamat, Nik Mazlan, et al.
Published: (2010)
Dynamic Bayesian networks and variable length genetic algorithm for designing cue-based model for dialogue act recognition
by: Yahya, Anwar Ali, et al.
Published: (2010)
by: Yahya, Anwar Ali, et al.
Published: (2010)
Towards virtuous cloud data storage using access policy hiding in ciphertext policy attribute-based encryption
by: Mohd Satar, Siti Dhalila, et al.
Published: (2021)
by: Mohd Satar, Siti Dhalila, et al.
Published: (2021)
Double random phase encryption scheme to multiplex and simultaneous encode multiple images
by: Alfalou, A., et al.
Published: (2009)
by: Alfalou, A., et al.
Published: (2009)
A new encryption algorithm over elliptic curve
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Modified Data Encryption Standard Algorithm for Textbased Applications
by: Mohamed Khmag, Asem Ib.
Published: (2006)
by: Mohamed Khmag, Asem Ib.
Published: (2006)
Performance Comparison of Encryption Algorithm in CPU and GPU Platform
by: Cheong, Hon Sang
Published: (2015)
by: Cheong, Hon Sang
Published: (2015)
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
Similar Items
-
Priority and random selection for dynamic window secured implicit geographic routing in wireless sensor network
by: Mohd Hanapi, Zurina, et al.
Published: (2009) -
Text messaging encryption system
by: Sundara Morthty, Nirmala Devi
Published: (2012) -
The new variable-length key symmetric cryptosystem
by: Pour, Davood Rezaei, et al.
Published: (2009) -
Probing mechanism scheduling for connected coverage wireless sensor network.
by: Mahdavi, Mina, et al.
Published: (2011) -
An upgrade on the key generation algorithm of the GGH-MKA lattice-based encryption scheme
by: Arif, Mandangan, et al.
Published: (2021)