Search Results - Derivation Cipher Key Algorithms
-
1
Authors:
Source: Al-Qadisiyah Journal of Pure Science; 2023, Vol. 28 Issue 1, p69-75, 7p
-
2
Authors:
Source: PeerJ Computer Science, Vol 10, p e2249 (2024)
Subject Terms: Key derivation function, Keyed-hash message authentication code based computational extractor, Stream cipher based pseudorandom expander, Stream ciphers, Keyed-hash message authentication codes, Block ciphers, Electronic computers. Computer science, QA75.5-76.95
File Description: electronic resource
-
3
Alternate Title: نموذج تشفير متعدد المستويات باستخدام خوارزميات RC5 و Twofish و Serpent المعدلة. (Arabic)
Authors: Hoobi, Mays M.
Source: Iraqi Journal of Science; 2024, Vol. 65 Issue 6, p3434-3450, 17p
-
4
Authors:
Source: Applied Sciences (2076-3417); Jul2025, Vol. 15 Issue 14, p7740, 51p
Subject Terms: BLOCK ciphers, INTERNET of things, DESIGN science, CRYPTOGRAPHY, COMPUTER performance
-
5
Authors:
Source: Multimedia Tools & Applications; Jul2023, Vol. 82 Issue 17, p26661-26678, 18p
-
6
Authors: et al.
Source: Algorithms; Sep2024, Vol. 17 Issue 9, p389, 27p
-
7
Authors: et al.
Source: Philosophical Transactions of the Royal Society A: Mathematical, Physical & Engineering Sciences; 1/16/2025, Vol. 383 Issue 2288, p1-17, 17p
-
8
Authors:
Source: Journal of Computational Methods in Sciences & Engineering. Sep2025, p1.
Subject Terms: *DATA privacy, *DATA encryption, *VIDEO compression, *VIDEO compression standards, *SYMMETRIC-key algorithms, *DATA protection software, *STREAM ciphers
-
9
Authors:
Source: Journal of Information Security & Applications. Nov2025, Vol. 94, pN.PAG-N.PAG. 1p.
Subject Terms: *BLOCK ciphers, *CRYPTOGRAPHY, *PARALLEL programming, *SYMMETRIC-key algorithms
-
10
Authors:
Source: Filomat, 2025 Jan 01. 39(14), 4821-4842.
Access URL: https://www.jstor.org/stable/27405830
-
11
Authors: et al.
Source: Scientific Reports. 11/28/2025, Vol. 15 Issue 1, p1-26. 26p.
Subject Terms: *IMAGE encryption, *CRYPTOGRAPHY, *ENTROPY, *SCIENTIFIC observation, *MEDICAL imaging systems
-
12
Authors: Faragallah, Osama
Source: Sensing & Imaging; Dec2011, Vol. 12 Issue 3/4, p73-94, 22p
-
13
Authors:
Source: Procedia Computer Science. 2020, Vol. 167, p1960-1969. 10p.
Subject Terms: Block ciphers, Message authentication codes, Advanced Encryption Standard
Company/Entity: National Institute of Standards & Technology (U.S.)
-
14
Authors: Stapleton, Jeff
Source: ISSA Journal; Feb2021, Vol. 19 Issue 2, p37-43, 7p
-
15
Authors:
Source: Entropy. Nov2022, Vol. 24 Issue 11, p1551. 16p.
Subject Terms: *IMAGE encryption, *ALGORITHMS, *ADDITION (Mathematics), *CRYPTOGRAPHY, *SOURCE code, *PERMUTATIONS, *CIPHERS
-
16
Authors:
Source: International Journal of Image & Graphics; May2025, Vol. 25 Issue 3, p1-32, 32p
-
17
Authors: et al.
Source: IET Image Processing (Wiley-Blackwell); Aug2022, Vol. 16 Issue 10, p2769-2790, 22p
Subject Terms: IMAGE encryption, PIXELS, ALGORITHMS, SECURITY systems
-
18
Authors: Karawia, Abdelrahman
Source: IET Image Processing (Wiley-Blackwell); Oct2019, Vol. 13 Issue 12, p2086-2097, 12p
-
19
Authors:
Source: Advances in Networks & Communications; 2011, p516-522, 7p
-
20
Authors: et al.
Source: Journal of Electronic Imaging; Sep/Oct2019, Vol. 28 Issue 5, p1-11, 11p
Subject Terms: COLOR image processing, IMAGE encryption, CHAOS theory, ALGORITHMS, COLORS, PIXELS
Nájsť tento článok vo Web of Science
Full Text Finder