Výsledky vyhľadávania - (RC5) Encryption and decryption algorithm
-
1
Utilization of Mobile Agents for Building a Secure Decentralized Energy System with Remote Monitoring
ISSN: 2210-142XVydavateľské údaje: 01.07.2016Vydané v International Journal of Computing and Digital System (Jāmiʻat al-Baḥrayn. Markaz al-Nashr al-ʻIlmī) (01.07.2016)Získať plný text
Journal Article -
2
Building a Secure Decentralized Energy System with Remote Monitoring Using Mobile Agents
Vydavateľské údaje: IEEE 01.10.2015Vydané v 2015 Fifth International Conference on e-Learning (econf) (01.10.2015)“…Centralized systems have failed in remote rural areas due to weak infrastructures, roads between urban habitations are in a very bad condition even if found,…”
Získať plný text
Konferenčný príspevok.. -
3
Applying decentralized approach based on mobile agent for improving e-transaction system
ISBN: 9781467355650, 1467355658Vydavateľské údaje: IEEE 01.12.2012Vydané v 2012 8th International Computer Engineering Conference (ICENCO) (01.12.2012)“…In this paper, we propose a solution which can not only satisfy security demands like confidentiality and integrity for data carried during e-transaction, but…”
Získať plný text
Konferenčný príspevok.. -
4
RC5 Performance Enhancement Based on Parallel Computing
ISSN: 2549-9610, 2549-9904Vydavateľské údaje: 31.01.2025Vydané v JOIV : international journal on informatics visualization Online (31.01.2025)“…This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources…”
Získať plný text
Journal Article -
5
An enhanced chaotic key-based RC5 block cipher adapted to image encryption
ISSN: 0020-7217, 1362-3060Vydavateľské údaje: Abingdon Taylor & Francis Group 01.07.2012Vydané v International journal of electronics (01.07.2012)“…RC5 is a block cipher that has several salient features such as adaptability to process different word lengths with a variable block size, a variable number of rounds and a variable-length secret key…”
Získať plný text
Journal Article -
6
Image Encryption Based on Multi-Level Keys on RC5 Algorithm
ISSN: 1865-7923, 1865-7923Vydavateľské údaje: 08.09.2022Vydané v International journal of interactive mobile technologies (08.09.2022)“… The RC5 type encryption algorithm is the most common and closest to perfection and symmetry algorithms, knowing that it faces many problems in which data collection was limited because it occurs…”
Získať plný text
Journal Article -
7
Proposed Parallel Algorithms to Encryption Image Based on Hybrid Enhancement RC5 and RSA
Vydavateľské údaje: IEEE 01.06.2019Vydané v 2019 International Engineering Conference (IEC) (01.06.2019)“…In recent years, image encryption algorithms have expanded for the defense of information from attackers to provide privacy to recipients…”
Získať plný text
Konferenčný príspevok.. -
8
Chaos Based Enhanced RC5 Algorithm for Security and Integrity of Clinical Images in Remote Health Monitoring
ISSN: 2169-3536, 2169-3536Vydavateľské údaje: Piscataway IEEE 2019Vydané v IEEE access (2019)“…) algorithm is a secure and simple encryption algorithm. Due to its simplicity, fast encryption, and low memory requirements, it is considered as a suitable block cipher for resource constraint environments, such as body area…”
Získať plný text
Journal Article -
9
Enhanced Biometric Template Protection Schemes for Securing Face Recognition in IoT Environment
ISSN: 2327-4662, 2327-4662Vydavateľské údaje: Piscataway IEEE 01.07.2024Vydané v IEEE internet of things journal (01.07.2024)“…With the increasing use of biometrics in Internet of Things (IoT)-based applications, it is essential to ensure that biometric-based authentication systems are…”
Získať plný text
Journal Article -
10
Honey Encryption based Hybrid Cryptographic Algorithm:A Fusion Ensuring Enhanced Security
Vydavateľské údaje: IEEE 01.06.2020Vydané v 2020 5th International Conference on Communication and Electronics Systems (ICCES) (01.06.2020)“… So, a Hybrid cryptographic algorithm is proposed where, Rivest Cipher 5 (RC5) is used for encryption and decryption of data and Honey Encryption…”
Získať plný text
Konferenčný príspevok.. -
11
Study of Data Security Algorithms using Verilog HDL
ISSN: 2088-8708, 2088-8708Vydavateľské údaje: Yogyakarta IAES Institute of Advanced Engineering and Science 01.10.2015Vydané v International journal of electrical and computer engineering (Malacca, Malacca) (01.10.2015)“… The designs were implemented in Quartus-II software. The results obtained for encryption and decryption procedures show a significant improvement on the performance of the three algorithms…”
Získať plný text
Journal Article -
12
Selection of parameter 'r' in RC5 algorithm on the basis of prime number
Vydavateľské údaje: IEEE 01.03.2014Vydané v 2014 Recent Advances in Engineering and Computational Sciences (RAECS) (01.03.2014)“… Ronald Rivest suggested the RC5 algorithm with 12 numbers of rounds for better encryption…”
Získať plný text
Konferenčný príspevok.. -
13
Implementation and Performance Assessment of Enhanced RC5 Cryptosystem Applied to Different File Types
ISSN: 2470-640XVydavateľské údaje: IEEE 01.10.2019Vydané v IEEE International Conference on System Engineering and Technology (Online) (01.10.2019)“… Result shows an average performance increase of 32.3% on encryption and 22.1% on decryption of the proposed ERC5a over classic RC5…”
Získať plný text
Konferenčný príspevok.. -
14
FPRC5: Improving the Data Security using Format PreservedRC5 Block Cipher Algorithm in Credit Card Application
Vydavateľské údaje: IEEE 08.07.2021Vydané v 2021 6th International Conference on Communication and Electronics Systems (ICCES) (08.07.2021)“… Data using Format-Preserving Encryption(FPE) is discussed in this article. FPE converts plaintext of a specific format into a ciphertext of the same format- e.g…”
Získať plný text
Konferenčný príspevok.. -
15
Enhancing S-LEACH security for wireless sensor networks
ISBN: 1467308196, 9781467308199ISSN: 2154-0357Vydavateľské údaje: IEEE 01.05.2012Vydané v 2012 IEEE International Conference on Electro/Information Technology (01.05.2012)“… The implementation of encryption/decryption algorithms which are the most essential part of the secure communication can be very intricate in WSNs since they incorporate routines that having very…”
Získať plný text
Konferenčný príspevok.. -
16
Randomised RC6 Algorithm with Python Implementation for Secure Email Communication
Vydavateľské údaje: IEEE 06.03.2025Vydané v 2025 4th International Conference on Range Technology (ICORT) (06.03.2025)“…The RC6 cryptographic technique stands out as a key example of the importance of encryption, utilising advanced methods like key expansion and modular arithmetic to ensure data integrity and confidentiality…”
Získať plný text
Konferenčný príspevok.. -
17
Symmetric Block Ciphers
ISBN: 1118496531, 9781118496534Vydavateľské údaje: United Kingdom Wiley 2013Vydané v Wireless Mobile Internet Security (2013)“… They are International Data Encryption Algorithm (IDEA; 1992), RC5, RC6, Data Encryption Standard (DES), and Advanced Encryption Standard…”
Získať plný text
Kapitola -
18
A Low Power Cryptography Solution Based on Chaos Theory in Wireless Sensor Nodes
ISSN: 2169-3536, 2169-3536Vydavateľské údaje: Piscataway IEEE 2019Vydané v IEEE access (2019)“… In this paper, we set up testbed experiments to evaluate the existing cryptographic algorithms for sensors, such as Skipjack and RC5, which are less secure compared to block cipher based on chaotic (BCC…”
Získať plný text
Journal Article -
19
An Enhanced BlowFish (eBf) Algorithm for Securing x64FileMessage Content
Vydavateľské údaje: IEEE 01.11.2018Vydané v 2018 IEEE 10th International Conference on Humanoid, Nanotechnology, Information Technology,Communication and Control, Environment and Management (HNICEM) (01.11.2018)“… Some of encryption algorithm includes DES, TripleDES, AES, TEA, Serpent, RC5 and Blowfish (Bf). An enhanced Blowfish algorithm (eBf…”
Získať plný text
Konferenčný príspevok.. -
20
Design and implementation of blowfish algorithm using reconfigurable platform
Vydavateľské údaje: IEEE 01.10.2017Vydané v 2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE) (01.10.2017)“… One method to ensure security is the use of cryptographic algorithms such as DES, AES, RC5, Blowfish etc…”
Získať plný text
Konferenčný príspevok..

