Modified Data Encryption Standard Algorithm for Textbased Applications
Today security is the important thing that we need to transfer data from location to another safely. As there is strong security, there is great hacker and spies at the other side. Therefore, many models and systems are looking for an ideal method to provide a secure environment for better optimi...
| Main Author: | Mohamed Khmag, Asem Ib. |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2006
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/206/ http://psasir.upm.edu.my/id/eprint/206/3/549039_fk_2006_8_abstrak_je__dh_pdf_.pdf |
Similar Items
Improved Algebraic Cryptanalysis of the Reduced-Round Advanced Encryption Standard
by: Rezaeipour, Davood
Published: (2011)
by: Rezaeipour, Davood
Published: (2011)
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
by: Mohammed Alaidaros, Hashem
Published: (2007)
by: Mohammed Alaidaros, Hashem
Published: (2007)
Design of Data Transceiver Using Differential Quaternary Phase Shift Keying (DQPSK) Modulation Technique
by: Chuah, Khar Yee
Published: (1996)
by: Chuah, Khar Yee
Published: (1996)
Modified algorithm for image watermarking using 2D-DCT and elgamal cryptosystem / Nur Azien Yazid, Kamilah Abdullah and Suhaila Abd Halim
by: Yazid, Nur Azien, et al.
Published: (2019)
by: Yazid, Nur Azien, et al.
Published: (2019)
Encrypting text data using elliptic curve cryptography
by: Ali, Abas Abdullahi
Published: (2018)
by: Ali, Abas Abdullahi
Published: (2018)
Implementation of Data Transmission Using X-10 Protocol within Household Wiring
by: Tan, Lay Khim
Published: (2007)
by: Tan, Lay Khim
Published: (2007)
Beberapa Penggunaan Teori Nombor dalam Kriptografi
by: Yunos, Faridah
Published: (2001)
by: Yunos, Faridah
Published: (2001)
Dispersion compensation positioning using chirped fiber bragg gratings for repeaterless transmission system
by: Khairi, Kharina
Published: (2019)
by: Khairi, Kharina
Published: (2019)
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
by: Abdulraheem, Waleed Khalid Amin
Published: (2019)
by: Abdulraheem, Waleed Khalid Amin
Published: (2019)
Some statistical simulation results over the 128-bit block cipher CLEFIA
by: Rezaeipour, Davood, et al.
Published: (2009)
by: Rezaeipour, Davood, et al.
Published: (2009)
Parametric analysis of a double E-shaped meander line monopole antenna for UHF applications / Nabilah Ripin … [et al.]
by: Ripin, Nabilah, et al.
Published: (2017)
by: Ripin, Nabilah, et al.
Published: (2017)
Zero distortion-based steganography for handwritten signature
by: Iranmanesh, Vahab
Published: (2018)
by: Iranmanesh, Vahab
Published: (2018)
Properties of pseudo τ- adic non-adjacent form and the expansion of τ-adic non-adjacent form
by: Mohd Suberi, Syahirah
Published: (2017)
by: Mohd Suberi, Syahirah
Published: (2017)
Multicast-unicast key management and data delivery method in wireless IPv6 networks
by: Zare Anari, Abbas Mehdizadeh
Published: (2012)
by: Zare Anari, Abbas Mehdizadeh
Published: (2012)
Novel Strategies to Accelerate Search Algorithms in Data Reduction
by: LE, HOANG LAM
Published: (2022)
by: LE, HOANG LAM
Published: (2022)
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
by: Mohd Ali, Fakariah Hani
Published: (2004)
by: Mohd Ali, Fakariah Hani
Published: (2004)
Performance enhancement of high data rate real-time wireless transmission system using superposition coding and unequal error protection
by: Al-Hasan, Yaseen Hasan Tahir
Published: (2011)
by: Al-Hasan, Yaseen Hasan Tahir
Published: (2011)
Character property method with biometric multifactor authentication for arabic text steganography
by: Roslan, Nuur Alifah
Published: (2018)
by: Roslan, Nuur Alifah
Published: (2018)
The disruptions and the opportunities in FinTech / Ilham Adli Azahar.
by: Azahar, Ilham Adli
Published: (2019)
by: Azahar, Ilham Adli
Published: (2019)
Efficient beamforming and spectral efficiency maximization in a joint transmission LTE-A system
by: Faisal, Ali Raed
Published: (2016)
by: Faisal, Ali Raed
Published: (2016)
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
by: Daud, Muhamad Azlan
Published: (2014)
by: Daud, Muhamad Azlan
Published: (2014)
Improving The Randomness of Output Sequence for The Advanced Encryption Standard Cryptographic Algorithm
by: Abdulbari Ali, Sherif
Published: (2005)
by: Abdulbari Ali, Sherif
Published: (2005)
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
by: Wong, Tze Jin
Published: (2006)
by: Wong, Tze Jin
Published: (2006)
Steganography For Embedding Data In Digital Image
by: Sowan, Salah Ibrahem
Published: (2003)
by: Sowan, Salah Ibrahem
Published: (2003)
Design And Analysis Of a Multi-channel Optical Fibre Lan Based On Modified Csma/cd Protocol
by: Ahmad Anas, Siti Barirah
Published: (2002)
by: Ahmad Anas, Siti Barirah
Published: (2002)
Enhancing performance of XTS cryptography mode of operation using parallel design
by: Ahmed Alomari, Mohammad
Published: (2009)
by: Ahmed Alomari, Mohammad
Published: (2009)
CIS3ll - Komunikasi Data Dan Rangkaian/CSS401 - Komunikasi Data - November 1994
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1994)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1994)
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
CSS401 - KOMUNIKASI DATA - JUN 1988.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1988)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1988)
Developing the ZigBee Based Data Payload Coding for Data Communication in Microgrids
by: Setiawan, M., et al.
Published: (2014)
by: Setiawan, M., et al.
Published: (2014)
CIS 311 - KOMUNIKASI DATA OKT-NOV 1995.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1995)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1995)
Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms
by: Teoh, Chin Chuang
Published: (2005)
by: Teoh, Chin Chuang
Published: (2005)
Two-round relay selection and joint massive MIMO transmission technique to enhance wireless information and power transfer
by: Oussama, Messadi
Published: (2021)
by: Oussama, Messadi
Published: (2021)
A Modified Kennard-Stone Algorithm for Optimal Division of Data for Developing Artificial Neural Network Models
by: Saptoro, Agus, et al.
Published: (2012)
by: Saptoro, Agus, et al.
Published: (2012)
CIS 311 - KOMUNIKASI DATA DAN RANGKAIAN OKT-NOV 1996.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1996)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1996)
Design and analysis of a dynamic code division multiple access communication system based on tunable optical filter
by: Hamarsheh, Mohammad M. Naji, et al.
Published: (2005)
by: Hamarsheh, Mohammad M. Naji, et al.
Published: (2005)
Genetic Algorithm for Web Data Mining
by: Loo, Kevin Teow Aik
Published: (2001)
by: Loo, Kevin Teow Aik
Published: (2001)
Indoor Radio Propagation Measurements in Different Environments Using Two Types of Transmitting Antenna
by: A. Ameen, Loukman
Published: (1997)
by: A. Ameen, Loukman
Published: (1997)
Effect Of Heat Treatment On Cellulose Crystallinity Of Empty Fruit Bunch Oil Palm Fiber And Its Relation To The Dimensional Stability Of Medium Density Fiberboard
by: Abdul Hafid, Siti Munawarah
Published: (2005)
by: Abdul Hafid, Siti Munawarah
Published: (2005)
Cryptanalysis of RSA and its variants using continuous midpoint subdivision analysis and lattices
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
Similar Items
-
Improved Algebraic Cryptanalysis of the Reduced-Round Advanced Encryption Standard
by: Rezaeipour, Davood
Published: (2011) -
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
by: Mohammed Alaidaros, Hashem
Published: (2007) -
Design of Data Transceiver Using Differential Quaternary Phase Shift Keying (DQPSK) Modulation Technique
by: Chuah, Khar Yee
Published: (1996) -
Modified algorithm for image watermarking using 2D-DCT and elgamal cryptosystem / Nur Azien Yazid, Kamilah Abdullah and Suhaila Abd Halim
by: Yazid, Nur Azien, et al.
Published: (2019) -
Encrypting text data using elliptic curve cryptography
by: Ali, Abas Abdullahi
Published: (2018)