[PDF][PDF] Multilevel Cryptography Model using RC5, Twofish, and Modified Serpent Algorithms

MM Hoobi - Iraqi Journal of Science, 2024 - iasj.net
Due to the rapid development of digital communication systems, information security is now
essential for both the storage and exchange of data. Security has become a key research …

HRM: -Term Heterogeneous Hybrid Blend Recursive Multiplier for GF() Polynomial

DR Vasanthi, SGK Reddy, M Rao - IEEE Transactions on Very …, 2024 - ieeexplore.ieee.org
Hardware-efficient polynomial multipliers are desired to satisfy the ever-growing demands of
computing within the finite field space toward developing a strong cryptosystems. This …

Enhanced DES Algorithm Using Efficient Classical Algorithm

IA Abdulmunem, MM Hoobi - Iraqi Journal of Science, 2024 - ijs.uobaghdad.edu.iq
The privacy, confidentiality, and integrity of user information are very important concerns;
therefore, cryptography is the solution to keep and satisfy these objectives. Encryption is the …

An fpga based method of polynomial multiplication

X Xiao, W Diao, A He, J Wu - 2022 Asia Conference on …, 2022 - ieeexplore.ieee.org
Polynomial multiplication is widely used in communication, signal and image processing. In
practical application, the system often needs to process a large amount of data efficiently …

Analisis Peningkatan hybrid Cryptosystem Untuk Enkripsi dan Dekripsi Menggunakan Vigenere Cipher dan RSA Pada Text

AY Suseno, N Sulistiyowati - … (Satuan Tulisan Riset …, 2021 - journal.lppmunindra.ac.id
Ilmu kriptografi merupakan suatu teknik matematis yang berhubungan dengan aspek
keamanan. Ilmu kriptografi memiliki dua jenis teknik yang memiliki kelebihan dan …

[HTML][HTML] 基于RSA 属性集工作量证明算法的研究

罗锐, 李子臣 - Computer Science and Application, 2021 - hanspub.org
工作量证明(Proof Of Work, 简称POW), 简单理解就是一份证明, 用来确认你做过一定量的工作.
监测工作的整个过程通常是极为低效的, 而通过对工作的结果进行认证来证明完成了相应的工作 …

[PDF][PDF] 数据加密标准算法的改进结构

MM Hoobi - 西南交通大学学报, 2020 - researchgate.net
摘要互联网正在成千上万的人之间提供至关重要的通信. 它也越来越多地被用作商业工具之一.
因此, 安全性对于确保通信安全和保护重要信息至关重要. 密码学算法在安全领域至关重要 …

[PDF][PDF] Comprehensive on Exploring Advanced Ciphering for Enhanced Data Protection

NAM Ali, SG Mohammed, FG Mohammed… - Wasit Journal for Pure …, 2023 - iasj.net
Steganography is the scientific practice of concealing a confidential message within a
medium, without causing any noticeable alteration to the original medium. Steganography …

Дослідження компонентних моделей при реалізації проєктів з метою підвищення безпеки

ПВ Бутенко - 2025 - openarchive.nure.ua
Анотація Об'єктом дослідження є порівняння безпеки вебзастосунку та десктоп
застосунку. Метою дослідження є розробка та впровадження компонентних моделей …

Toward a New Safer Cybersecurity Posture using RC6 & RSA as Hybrid Crypto-Algorithms with VC Cipher

A Jenan S, A Shuruq A… - International Journal of …, 2023 - koreascience.kr
As our community has become increasingly dependent on technology, security has become
a bigger concern, which makes it more important and challenging than ever. security can be …