Implementation of El-Gamal algorithm for speech signals encryption and decryption

OA Imran, SF Yousif, IS Hameed, WNAD Abed… - Procedia Computer …, 2020 - Elsevier
In the applications of Internet and wireless communication network, information security is
one of the most challenging aspects. Cryptography is the best solution that offers the …

An analysis and a comparative study of cryptographic algorithms used on the Internet of Things (IoT) based on avalanche effect

KD Muthavhine… - … Conference on Information …, 2018 - ieeexplore.ieee.org
The world is already on the way of connecting everything (objects) to the internet, from
refrigerators to sprinkler systems. This interconnection of objects to the internet is new …

Implementation of QR Code and Digital Signature to Determine the Validity of KRS and KHS Documents

FF Rochman, IK Raharjana… - Scientific Journal of …, 2017 - journal.unnes.ac.id
Universitas Airlangga students often find it difficult to verify the mark that came out in the
Kartu Hasil Studi (KHS) is called Study Result Card or courses taken in the Kartu Rencana …

A study of public key 'e'in RSA algorithm

C Intila, B Gerardo, R Medina - IOP Conference Series: Materials …, 2019 - iopscience.iop.org
RSA Algorithm is public-key cryptography which exposed from different attack based on the
public key'e'and modulus'n'. Different studies on RSA Algorithm modify only the …

[PDF][PDF] A survey of access control and data encryption for database security

EF Khalaf, MM Kadi - Journal of King Abdulaziz University, 2017 - kau.edu.sa
With the vast amount of data generated nowadays, organizing and managing of these data
are very important to allow the users to access, retrieve, and update their data by using …

Quaternion-based encryption/decryption of audio signal using digital image as a variable key

MI Khalil - International Journal of Communication Networks …, 2017 - search.proquest.com
With the rapid growth of communication technology, cryptography plays a significant role in
securing and verification of information exchanged via public communication channels. The …

Homomorphic method additive using pailler and multiplicative based on RSA in integers numbers

H Touil, N El Akkad, K Satori - International Conference On Big Data and …, 2021 - Springer
When we use conventional encryption, we are confronted with a situation we are used to
and don't even consider it a problem. To work with encrypted data, we have to decipher it …

Modifying CAST algorithm in order to increase encryption strength and to reduce memory limitations

KD Muthavhine… - … Conference on Artificial …, 2021 - ieeexplore.ieee.org
Data stored and transmitted by Internet of Things (IoT) has been crucial to many human
kinds for the last years. Recently, data is exponentially growing on IoT devices. This data …

[PDF][PDF] Design and analysis of DNA binary cryptography algorithm for plaintext

H Al-Mahdi, OR Shahin, Y Fouad, K Alkhaldi - Int. J. Eng. Technol, 2018 - researchgate.net
Due to the rapid growth of computer networks, more sensitive information is being
exchanged over such networks. Securing information from unauthorized parties has become …

Using quaternion Fourier transform in steganography systems

MI Khalil - International Journal of Communication Networks …, 2018 - search.proquest.com
Abstract steganography is the discipline of exchanging information messages in such way
that no one, other than the intended recipient, suspects the existence of the message. The …