[PDF][PDF] Affine cipher cryptanalysis using genetic algorithms

YS Mezaal, SF Abdulkareem - JP Journal of Algebra, Number Theory …, 2017 - academia.edu
Genetic algorithms (GAs) have been used as a powerful tool for cryptanalyzing affine
ciphers in this paper for the first time. They are one of heuristic search techniques which use …

[PDF][PDF] Image Encryption Based on Multi-Level Keys on RC5 Algorithm.

AS Jamil, AMS Rahma - Int. J. Interact. Mob. Technol., 2022 - researchgate.net
In recent years, the need to develop encryption algorithms has led to an increase in the
working and efficiency of algorithms to protect the transmission and reception of information …

[PDF][PDF] A performance comparison of encryption/decryption algorithms for UAV swarm communications

TT Khoei, E Ghribi, P Ranganathan… - Academic Press, 2021 - researchgate.net
Encryption algorithms play an essential role in network security. They are one type of
countermeasure that can prevent unauthorized access of data. Although the security …

[图书][B] Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean Approach

B Zolfaghari, K Bibak - 2022 - books.google.com
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-
secure cryptosystem guarantees that the malicious third party cannot guess anything …

Security analysis of improved one-time pad cryptography using TRNG key generator

EMM Manucom, BD Gerardo… - 2019 IEEE 5th …, 2019 - ieeexplore.ieee.org
Cryptography is one of the important aspect of data and information security. The security
strength of cryptographic algorithms rely on the secrecy and randomness of keys. In this …

New Key Generation and Encryption Algorithms for Privacy Preservation in Mobile Ad Hoc Networks

AAP Ratna, RF Sari - International Journal of …, 2017 - search.proquest.com
Abstract Mobile Ad Hoc Networks (MANETs) get widespread applications along with the
evolving technologies. However, MANETs are at risk due to the shortage of security …

Information-theoretic cryptography and perfect secrecy

B Zolfaghari, K Bibak - Perfect Secrecy in IoT: A Hybrid Combinatorial …, 2022 - Springer
In this chapter, we first introduce entropy and some basic concepts related to information
theory. We show how entropy has find its way from thermodynamics into information theory …

Algoritma Split-Merge One Time Pad Dalam Peningkatan Enkripsi Data

P Utomo, S Sapriadi, M Zarlis - … (Seminar Nasional Teknik …, 2017 - semantika.polgan.ac.id
Abstract One Time Pad (OTP) merupakan salah satu algoritma kriptografi yang sangat sulit
untuk dipecahkan kriptanalis. Namun seiring perkembangan teknologi, semakin banyak …

[PDF][PDF] GRAPHIC DIGITAL TECHNIQUES IN THE FINE ARTS DESIGN AND PROCESSING.

A DARRAJI, K FAKHIR - Journal of Theoretical & Applied Information …, 2018 - jatit.org
Computerized graphics processing techniques cannot just resolve the difficulty of customary
painting simulation in the art, but have more gains in the teaching of art features and task to …

Perfect Secrecy in IoT

B Zolfaghari, K Bibak - Springer
Perfectly secure cryptography is a branch of information-theoretic cryptography. A perfectly
secure cryptosystem guarantees that the malicious third party cannot guess anything …