[Retracted] A Secure Environment Using a New Lightweight AES Encryption Algorithm for E‐Commerce Websites

FT Abdul Hussien, AMS Rahma… - Security and …, 2021 - Wiley Online Library
Providing security for transmitted data through the e‐commerce environment requires using
a fast and high secure encryption algorithm. Balancing between the speed and the security …

A modified secure hash design to circumvent collision and length extension attacks

ZA Al-Odat, SU Khan, E Al-Qtiemat - Journal of Information Security and …, 2022 - Elsevier
This paper introduces an improved version of the secure hash algorithms, SHA-1, and SHA-
2. The proposed work produces a strengthened secure hash design using the fusion …

Modified AES cipher round and key schedule

EM De Los Reyes, AM Sison… - Indonesian Journal of …, 2019 - section.iaesonline.com
Abstract In this paper, Advanced Encryption Standard was modified to address the
lowdiffusion rate at the early rounds by adding additional primitive operationssuch as …

The sponge structure modulation application to overcome the security breaches for the MD5 and SHA-1 hash functions

Z Al-Odat, S Khan - 2019 IEEE 43rd annual computer software …, 2019 - ieeexplore.ieee.org
This paper presents a Sponge structure modulation of the MD5 and SHA-1 hash functions.
The work employs the Keccak permutation function to build the proposed scheme. The work …

[PDF][PDF] Implementation of a bit permutation-based advanced encryption standard for securing text and image files

HV Gamido - Indonesian Journal of Electrical Engineering and …, 2020 - researchgate.net
The paper proposes a modification of the Advanced Encryption Standard (AES) to address
its high computational requirement steaming from the complex mathematical operations in …

Performance and security analysis using B-128 modified blowfish algorithm

S Kumar, D Kumar, N Singh - Multimedia Tools and Applications, 2023 - Springer
Abstract Information security is a domain having extensive applications in the twenty-first
century and beyond. Encryption is a technique used to prevent data from being accessed …

[PDF][PDF] File encryption based on reduced-round AES with revised round keys and key schedule

M Edjie, AM Sison, RP Medina - Indonesian Journal of …, 2019 - pdfs.semanticscholar.org
The continuing advancement of technology had provided security issues in protecting the
confidentiality of information. The need to protect unauthorized access of a third party is …

[PDF][PDF] A comparison between the secp256r1 and the koblitz secp256k1 bitcoin curves

A Houria, BM Abdelkader… - Indonesian Journal of …, 2019 - academia.edu
Bitcoin uses elliptic curve cryptography for its keys and signatures, but the specific
secp256k1 curve used is rather unusual. The ECDSA keys used to generate Bitcoin …

Modified SHA-512 Algorithm for Secured Password Hashing

PJF Bemida, AM Sison… - 2021 Innovations in Power …, 2021 - ieeexplore.ieee.org
The secure hash algorithm (SHA) is a widely used function for password hashing. This study
introduced a modified SHA-512 algorithm by modifying the message scheduling, hash …

Performance evaluation and design of B‐128 modified Blowfish algorithm

S Kumar, D Kumar - Security and Privacy, 2023 - Wiley Online Library
The field of information security has many uses in the modern day and beyond. Encryption is
a method used to secure information from unauthorized access. Since symmetric key …