Suchergebnisse - (RC5) Encryption and decryption algorithm

Andere Suchmöglichkeiten:

  1. 1
  2. 2

    Building a Secure Decentralized Energy System with Remote Monitoring Using Mobile Agents von Eldegwi, H. M., Badawy, M. B., Kelash, Hamdy M.

    Veröffentlicht: IEEE 01.10.2015
    “… Centralized systems have failed in remote rural areas due to weak infrastructures, roads between urban habitations are in a very bad condition even if found, …”
    Volltext
    Tagungsbericht
  3. 3

    Applying decentralized approach based on mobile agent for improving e-transaction system von El-degwy, Hossam, Kelash, Hamdy M., Faragallah, Osama S.

    ISBN: 9781467355650, 1467355658
    Veröffentlicht: IEEE 01.12.2012
    “… In this paper, we propose a solution which can not only satisfy security demands like confidentiality and integrity for data carried during e-transaction, but …”
    Volltext
    Tagungsbericht
  4. 4

    RC5 Performance Enhancement Based on Parallel Computing von Abead, Suaad Ali, Ali, Nada Hussein M.

    ISSN: 2549-9610, 2549-9904
    Veröffentlicht: 31.01.2025
    “… This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources …”
    Volltext
    Journal Article
  5. 5

    An enhanced chaotic key-based RC5 block cipher adapted to image encryption von Faragallah, Osama S.

    ISSN: 0020-7217, 1362-3060
    Veröffentlicht: Abingdon Taylor & Francis Group 01.07.2012
    Veröffentlicht in International journal of electronics (01.07.2012)
    “… RC5 is a block cipher that has several salient features such as adaptability to process different word lengths with a variable block size, a variable number of rounds and a variable-length secret key …”
    Volltext
    Journal Article
  6. 6

    Image Encryption Based on Multi-Level Keys on RC5 Algorithm von Salim Jamil, Abeer, Monem S. Rahma, Abdul

    ISSN: 1865-7923, 1865-7923
    Veröffentlicht: 08.09.2022
    “… The RC5 type encryption algorithm is the most common and closest to perfection and symmetry algorithms, knowing that it faces many problems in which data collection was limited because it occurs …”
    Volltext
    Journal Article
  7. 7

    Proposed Parallel Algorithms to Encryption Image Based on Hybrid Enhancement RC5 and RSA von Hussein, Khaled Ali, Kareem, Taha Basil

    Veröffentlicht: IEEE 01.06.2019
    Veröffentlicht in 2019 International Engineering Conference (IEC) (01.06.2019)
    “… In recent years, image encryption algorithms have expanded for the defense of information from attackers to provide privacy to recipients …”
    Volltext
    Tagungsbericht
  8. 8

    Chaos Based Enhanced RC5 Algorithm for Security and Integrity of Clinical Images in Remote Health Monitoring von Shahzadi, Romana, Anwar, Syed Muhammad, Qamar, Farhan, Ali, Mudassar, Rodrigues, Joel J. P. C.

    ISSN: 2169-3536, 2169-3536
    Veröffentlicht: Piscataway IEEE 2019
    Veröffentlicht in IEEE access (2019)
    “… ) algorithm is a secure and simple encryption algorithm. Due to its simplicity, fast encryption, and low memory requirements, it is considered as a suitable block cipher for resource constraint environments, such as body area …”
    Volltext
    Journal Article
  9. 9

    Enhanced Biometric Template Protection Schemes for Securing Face Recognition in IoT Environment von Sardar, Alamgir, Umer, Saiyed, Rout, Ranjeet Kumar, Sahoo, Kshira Sagar, Gandomi, Amir H.

    ISSN: 2327-4662, 2327-4662
    Veröffentlicht: Piscataway IEEE 01.07.2024
    Veröffentlicht in IEEE internet of things journal (01.07.2024)
    “… With the increasing use of biometrics in Internet of Things (IoT)-based applications, it is essential to ensure that biometric-based authentication systems are …”
    Volltext
    Journal Article
  10. 10

    Honey Encryption based Hybrid Cryptographic Algorithm:A Fusion Ensuring Enhanced Security von Vivek Raj, K, Ankitha, H, Ankitha, N G, Kanthi Hegde, L S

    Veröffentlicht: IEEE 01.06.2020
    “… So, a Hybrid cryptographic algorithm is proposed where, Rivest Cipher 5 (RC5) is used for encryption and decryption of data and Honey Encryption …”
    Volltext
    Tagungsbericht
  11. 11

    Study of Data Security Algorithms using Verilog HDL von Sumathi, M., Nirmala, D., Rajkumar, R. Immanuel

    ISSN: 2088-8708, 2088-8708
    Veröffentlicht: Yogyakarta IAES Institute of Advanced Engineering and Science 01.10.2015
    “… The designs were implemented in Quartus-II software. The results obtained for encryption and decryption procedures show a significant improvement on the performance of the three algorithms …”
    Volltext
    Journal Article
  12. 12

    Selection of parameter 'r' in RC5 algorithm on the basis of prime number von Gill, Harsimranjit Singh

    Veröffentlicht: IEEE 01.03.2014
    “… Ronald Rivest suggested the RC5 algorithm with 12 numbers of rounds for better encryption …”
    Volltext
    Tagungsbericht
  13. 13

    Implementation and Performance Assessment of Enhanced RC5 Cryptosystem Applied to Different File Types von Vibar, Jayvee Christopher N., Sison, Ariel M., Medina, Ruji P.

    ISSN: 2470-640X
    Veröffentlicht: IEEE 01.10.2019
    “… Result shows an average performance increase of 32.3% on encryption and 22.1% on decryption of the proposed ERC5a over classic RC5 …”
    Volltext
    Tagungsbericht
  14. 14

    FPRC5: Improving the Data Security using Format PreservedRC5 Block Cipher Algorithm in Credit Card Application von Prakash, Divy

    Veröffentlicht: IEEE 08.07.2021
    “… Data using Format-Preserving Encryption(FPE) is discussed in this article. FPE converts plaintext of a specific format into a ciphertext of the same format- e.g …”
    Volltext
    Tagungsbericht
  15. 15

    Enhancing S-LEACH security for wireless sensor networks von El-Saadawy, M., Shaaban, E.

    ISBN: 1467308196, 9781467308199
    ISSN: 2154-0357
    Veröffentlicht: IEEE 01.05.2012
    “… The implementation of encryption/decryption algorithms which are the most essential part of the secure communication can be very intricate in WSNs since they incorporate routines that having very …”
    Volltext
    Tagungsbericht
  16. 16

    Randomised RC6 Algorithm with Python Implementation for Secure Email Communication von Choppala, Praveen B., Mohammed, Ashik, Katta, Anil Kumar

    Veröffentlicht: IEEE 06.03.2025
    “… The RC6 cryptographic technique stands out as a key example of the importance of encryption, utilising advanced methods like key expansion and modular arithmetic to ensure data integrity and confidentiality …”
    Volltext
    Tagungsbericht
  17. 17

    Symmetric Block Ciphers von Rhee, Man Young

    ISBN: 1118496531, 9781118496534
    Veröffentlicht: United Kingdom Wiley 2013
    Veröffentlicht in Wireless Mobile Internet Security (2013)
    “… They are International Data Encryption Algorithm (IDEA; 1992), RC5, RC6, Data Encryption Standard (DES), and Advanced Encryption Standard …”
    Volltext
    Buchkapitel
  18. 18

    A Low Power Cryptography Solution Based on Chaos Theory in Wireless Sensor Nodes von Sharafi, Masoumeh, Fotouhi-Ghazvini, Faranak, Shirali, Mohsen, Ghassemian, Mona

    ISSN: 2169-3536, 2169-3536
    Veröffentlicht: Piscataway IEEE 2019
    Veröffentlicht in IEEE access (2019)
    “… In this paper, we set up testbed experiments to evaluate the existing cryptographic algorithms for sensors, such as Skipjack and RC5, which are less secure compared to block cipher based on chaotic (BCC …”
    Volltext
    Journal Article
  19. 19

    An Enhanced BlowFish (eBf) Algorithm for Securing x64FileMessage Content von Dulla, Godfrey L., Gerardo, Bobby D, Medina, Ruji P.

    Veröffentlicht: IEEE 01.11.2018
    “… Some of encryption algorithm includes DES, TripleDES, AES, TEA, Serpent, RC5 and Blowfish (Bf). An enhanced Blowfish algorithm (eBf …”
    Volltext
    Tagungsbericht
  20. 20

    Design and implementation of blowfish algorithm using reconfigurable platform von Nalawade, Shraphalya B., Gawali, Dhanashri H.

    Veröffentlicht: IEEE 01.10.2017
    “… One method to ensure security is the use of cryptographic algorithms such as DES, AES, RC5, Blowfish etc …”
    Volltext
    Tagungsbericht