UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 112
1.
  • Modern and Lightweight Comp... Modern and Lightweight Component-based Symmetric Cipher Algorithms
    Samar A. Qassir; Methaq T. Gaata; Ahmed T. Sadiq ARO (Koya), 12/2022, Letnik: 10, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Information security, being one of the corner stones of network and communication technology, has been evolving tremendously to cope with the parallel evolution of network security threats. Hence, ...
Celotno besedilo
2.
  • Analytical Approach for Dat... Analytical Approach for Data Encryption Standard Algorithm
    Al-hazaimeh, Obaida M.; Al-Shannaq, Moyawiah A.; Bawaneh, Mohammed J. ... International journal of interactive mobile technologies, 08/2023, Letnik: 17, Številka: 14
    Journal Article
    Recenzirano

    Although it was first developed and studied in the late 1970s and early 1977s, the Data Encryption Standard (DES) algorithm has grown in popularity. There are two causes for this occurrence. First, ...
Celotno besedilo
3.
  • Development of modified AES... Development of modified AES algorithm for data security
    Kumar, Puneet; Rana, Shashi B. Optik (Stuttgart), 02/2016, Letnik: 127, Številka: 4
    Journal Article
    Recenzirano

    Cryptography is a process by which information or messages can be sent from one user to another user which provides several security services such as confidentiality, data integrity or authentication ...
Celotno besedilo
4.
  • Quantum Cryptanalysis of Af... Quantum Cryptanalysis of Affine Cipher
    Mathews, Mahima Mary; Panchami, V; Ajith, Vishnu IEEE journal on emerging and selected topics in circuits and systems, 07/2024
    Journal Article
    Recenzirano

    Quantum Algorithms reduce the computational complexity or solve certain difficult problems that were originally impossible to solve with classical computers. Grover's search algorithm is a Quantum ...
Celotno besedilo
5.
  • A comprehensive survey of m... A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments
    Kong, Jia Hao; Ang, Li-Minn; Seng, Kah Phooi Journal of network and computer applications, 03/2015, Letnik: 49
    Journal Article
    Recenzirano

    Modern cryptographic algorithms play an irreplaceable role in data communication systems for various areas of applications. These algorithms are the backbone of data protection and secrecy for highly ...
Celotno besedilo
6.
  • SUMER: A New Family of Ligh... SUMER: A New Family of Lightweight and Traditional Block Ciphers with Multi-Modes
    Dawood, Omar Iraqi Journal for Computer Science and Mathematics, 07/2024, Letnik: 5, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    With the recent increase in the risks and attacks facing our daily lives and digital environment around us,the trend towards securing data has become inevitable. Block ciphers play a crucial role in ...
Celotno besedilo
7.
Celotno besedilo
8.
Celotno besedilo

PDF
9.
  • Synchronous Stream Encrypti... Synchronous Stream Encryption Using an Additional Channel to Set the Key
    Vavrenyuk, Aleksander B.; Makarov, Victor V.; Shurygin, Victor A. Procedia computer science, 2021, Letnik: 190
    Journal Article
    Recenzirano
    Odprti dostop

    The article describes the possibility to refuse the direct transfer of the key from the sender to the recipient in the synchronous stream encryption scheme. We suggest creating a table of ...
Celotno besedilo

PDF
10.
  • Advanced biometric system s... Advanced biometric system security: a novel hybrid approach integrating optical asymmetric PTFT and symmetric cipher techniques
    Hossam Eldein Mohamed, Fatma A.; El-Shafai, Walid; Alnakhli, M. ... Optical and quantum electronics, 04/2024, Letnik: 56, Številka: 6
    Journal Article
    Recenzirano

    The rapidly evolving field of biometric recognition and verification technologies has seen substantial progress recently. However, the storage of biometric data in cloud environments presents ...
Celotno besedilo
1 2 3 4 5
zadetkov: 112

Nalaganje filtrov