Constructing Highly Nonlinear Cryptographic Balanced Boolean Functions on Learning Capabilities of Recurrent Neural Networks

HM Waseem, MA Hafeez, S Ahmed, BD Deebak… - IEEE …, 2024 - ieeexplore.ieee.org
This study presents a novel approach to cryptographic algorithm design that harnesses the
power of recurrent neural networks. Unlike traditional mathematical-based methods, neural …

[PDF][PDF] Kombinasi Algoritma AES, RC4 dan Elgamal Dalam Skema Hybrid Untuk Keamanan Data

A Widarma - J. Comput. Eng. Syst. Sci, 2016 - researchgate.net
Pengiriman atau pertukaran data adalah hal yang sering terjadi dalam dunia teknologi
informasi. Data yang dikirim kadang sering berisi data informasi yang penting bahkan …

Methods for improving the implementation of advanced encryption standard hardware accelerator on field programmable gate array‐A survey

N Renugadevi, S Thangallapally… - Security and …, 2022 - Wiley Online Library
With the majority of users migrating to a cloud computing platform, the responsibility for data
security has increased considerably. As data with various levels of sensitivity moves out of …

Protecting user credentials against SQL injection through cryptography and image steganography

PS Banga, AO Portillo-Dominguez… - 2022 10th …, 2022 - ieeexplore.ieee.org
As today's world is all about the internet and technology, the whole context of businesses
has been shifted digitally. Almost every sector has established itself on a digital platform …

CLSM: couple layered security model a high-capacity data hiding scheme using with steganography

C Kocak - Image Analysis & Stereology, 2017 - avesis.gazi.edu.tr
Cryptography and steganography are the two significant techniques used in secrecy of
communications and in safe message transfer. In this study CLSM-Couple Layered Security …

DWSA: a secure data warehouse architecture for encrypting data using AES and OTP encryption technique

S Gupta, S Jain, M Agarwal - Soft Computing: Theories and Applications …, 2019 - Springer
Data warehouse is the most important asset of an organization as it contains highly valuable
and sensitive information that is useful in decision-making process. The data warehouse …

[PDF][PDF] Lightweight symmetric encryption algorithm for secure database

H Al-Souly, A Al-Sheddi, H Kurdi - Science and Information Conference, 2013 - Citeseer
Virtually all of today's organizations store their data in huge databases to retrieve,
manipulate and share them in an efficient way. Due to the popularity of databases for storing …

Improvement of ETSFS algorithm for secure database

P Uduthalapally, B Zhou - 2016 4th international symposium …, 2016 - ieeexplore.ieee.org
In the present era, one of the major encounters is data security. Most organizations store
their data in huge databases that enables uncomplicated retrieval, manipulations, and also …

Implementasi Metode Algoritma AES Pada Perlindungan Data Sistem Login

L Clara, A Budi - Jurnal Informatika dan Bisnis, 2021 - jurnal.kwikkiangie.ac.id
At present the development of digital technology and telecommunications is progressing
very rapidly throughout the world, making almost in every country always closely related to …

One time pad encryption technique in cryptography

AB Kumari, NCSN Iyengar - International Journal of …, 2023 - milestoneresearch.in
Cloud Computing is a term that is used for the provision of host services over the Internet
The secure data storage on cloud environments is the primary requirement of such …