Search Results - "tiny encryption algorithm"
-
1
Construction of neural distinguishers of the tiny encryption algorithm family block ciphers
ISSN: 0941-0643, 1433-3058Published: London Springer London 01.12.2025Published in Neural computing & applications (01.12.2025)“… The Cambridge Laboratory initially proposed the Tiny Encryption Algorithm (TEA) family of block ciphers…”
Get full text
Journal Article -
2
Correction: Construction of neural distinguishers of the tiny encryption algorithm family block ciphers
ISSN: 0941-0643, 1433-3058Published: London Springer London 01.12.2025Published in Neural computing & applications (01.12.2025)Get full text
Journal Article -
3
CTEA: Chaos based tiny encryption algorithm using ECDH and TinkerBell map for data security in supply chain management
ISSN: 1573-7721, 1380-7501, 1573-7721Published: New York Springer US 01.04.2025Published in Multimedia tools and applications (01.04.2025)“… For the purpose of data security in SCM environment, a novel Chaos based Tiny Encryption Algorithm named as CTEA is designed with the help of Elliptic Curve Diffie–Hellman (ECDH…”
Get full text
Journal Article -
4
SMS Security System on Mobile Devices Using Tiny Encryption Algorithm
ISSN: 1742-6588, 1742-6596Published: Bristol IOP Publishing 01.04.2018Published in Journal of physics. Conference series (01.04.2018)“…The development of telecommunications technology is so rapid has given such great benefits. With the telecommunication technology, distance and time no longer…”
Get full text
Journal Article -
5
Security of Image File with Tiny Encryption Algorithm And Modified Significant Bit Pseudo Random Number Generator
ISSN: 1742-6588, 1742-6596Published: IOP Publishing 01.06.2020Published in Journal of physics. Conference series (01.06.2020)“… Tiny Encryption Algorithm (TEA) algorithm is a symmetric cryptographic algorithm in which the key is divided into four subsections and uses 128 key bits and operates 64 bits of data blocks and then divided into two blocks into 32…”
Get full text
Journal Article -
6
A Dynamic Step-wise Tiny Encryption Algorithm with Fruit Fly Optimization for Quality of Service improvement in healthcare
ISSN: 2772-4425, 2772-4425Published: Elsevier Inc 01.11.2023Published in Healthcare analytics (New York, N.Y.) (01.11.2023)“…Healthcare highly depends on accessing, processing, analyzing, sharing, and storing electronic data. Cloud computing has evolved in various healthcare fields,…”
Get full text
Journal Article -
7
Hybrid Cryptosystem Using Tiny Encryption Algorithm and LUC Algorithm
ISSN: 1757-8981, 1757-899XPublished: Bristol IOP Publishing 01.01.2018Published in IOP conference series. Materials Science and Engineering (01.01.2018)“…Security becomes a very important issue in data transmission and there are so many methods to make files more secure. One of that method is cryptography…”
Get full text
Journal Article -
8
EXTENDED TINY ENCRYPTION ALGORITHM EQUIPPED WITH ARABIC SCRIPT
ISSN: 0030-9877, 2411-0930Published: Lahore Knowledge Bylanes 30.09.2018Published in Pakistan journal of science (30.09.2018)“… (for instance, Arabic, Urdu, and Persian) using Extended Tiny Encryption Algorithm (XTEA). The proposed algorithm was implemented in PHP, and the results show that the resultant cipher was more secure…”
Get full text
Journal Article -
9
Breaching Security of Full Round Tiny Encryption Algorithm
ISSN: 1930-1650, 1930-1669Published: Hershey IGI Global 01.01.2018Published in International journal of information security and privacy (01.01.2018)“…Tiny encryption algorithm is a 64-bit block cipher designed by Wheeler and Needham in 1994 and attracted much of its attention due to its capability of reducing the hardware cost…”
Get full text
Journal Article -
10
The Tiny Encryption Algorithm
ISSN: 0161-1194, 1558-1586Published: West Point Taylor & Francis Group 01.07.2007Published in Cryptologia (01.07.2007)“…The Tiny Encryption Algorithm (TEA) has been around for just over ten years. It is probably the most "minimal"-and hence fastest-block cipher ever devised and yet appears resistant to most attacks…”
Get full text
Journal Article -
11
Using of tiny encryption algorithm in CAN-Bus communication
ISSN: 1212-9151, 1805-9376Published: Prague Czech Academy of Agricultural Sciences (CAAS) 30.06.2016Published in Research in Agricultural Engineering (Praha) (30.06.2016)“…The rising costs of agriculture machine operation force manufacturers to look for solutions that simplify the machine operation to its users and increase user…”
Get full text
Journal Article -
12
Multi-key Modified Tiny Encryption Algorithm for HealthCare
ISSN: 2227-524X, 2227-524XPublished: 15.04.2018Published in International journal of engineering & technology (Dubai) (15.04.2018)“…Healthcare data is crucial in patient’s surveillance. To give the finest treatment to patients the data should be of the best quality. Many security threats…”
Get full text
Journal Article -
13
Demitasse: A "Small" Version of the Tiny Encryption Algorithm and Its Use in a Classroom Setting
ISSN: 0161-1194, 1558-1586Published: Philadelphia, PA Taylor & Francis Group 01.01.2013Published in Cryptologia (01.01.2013)“… The cipher is based on the Tiny Encryption Algorithm, but the parameters have been reduced in order to allow the students to operate the cipher with paper and pencil rather than a computer…”
Get full text
Journal Article -
14
AN IMPROVEMENT OF PRIVACY PRESERVING USING BLOCK-TINY ENCRYPTION ALGORITHM: CLOUD APPROACH
ISSN: 0976-5697, 0976-5697Published: Udaipur International Journal of Advanced Research in Computer Science 20.08.2017Published in International journal of advanced research in computer science (20.08.2017)“… To progress Block-Tiny Encryption Algorithm(TEA-AES) privacy conserving model for conserving the privacy…”
Get full text
Journal Article -
15
Securing IoT Devices with Enhanced Tiny Encryption Algorithm
Published: IEEE 04.12.2024Published in 2024 3rd International Conference on Automation, Computing and Renewable Systems (ICACRS) (04.12.2024)“… The Tiny Encryption Algorithm (TEA) has gained wide adoption for its simplicity and minimal resource requirements, making it a suitable choice for constrained IoT environments…”
Get full text
Conference Proceeding -
16
A Secure and Efficient Lightweight Symmetric Encryption Scheme for Transfer of Text Files between Embedded IoT Devices
ISSN: 2073-8994, 2073-8994Published: Basel MDPI AG 01.02.2019Published in Symmetry (Basel) (01.02.2019)“… Tiny encryption algorithm (TEA) is the most attractive among all, with its lower memory utilization and ease of implementation on both hardware and software scales…”
Get full text
Journal Article -
17
ENCRYPTION THREE-DIMENSION IMAGE USING TINY ALGORITHM
ISSN: 2313-190X, 2520-4912Published: University of Information Technology and Communications 01.12.2020Published in Iraqi journal for computers and informatics (Online) (01.12.2020)“…The development of systems allows providing the capability of using three-dimension (3D) pictures over the internet especially in social media. In previous…”
Get full text
Journal Article -
18
Tiny Encryption Algorithm on Discrete Cosine Transform Watermarking
Published: IEEE 09.04.2021Published in 2021 3rd East Indonesia Conference on Computer and Information Technology (EIConCIT) (09.04.2021)“… In this research, Tiny Encryption Algorithm (TEA) is implemented on watermarking using Discrete Cosine Transform (DCT…”
Get full text
Conference Proceeding -
19
Revolutionizing XTEA: Unveiling PREXTEA and TRIXTEA-Enhanced Efficiency and Security in Internet of Things
ISSN: 2327-4662, 2327-4662Published: Piscataway IEEE 15.02.2025Published in IEEE internet of things journal (15.02.2025)“…The future of Internet is envisioned as the Internet of Things (IoT), a concept where countless physical objects, many of which possess limited or minimal…”
Get full text
Journal Article -
20
Demitasse: A aSmalla Version of the Tiny Encryption Algorithm and Its Use in a Classroom Setting
ISSN: 0161-1194, 1558-1586Published: 01.01.2013Published in Cryptologia (01.01.2013)“… The cipher is based on the Tiny Encryption Algorithm, but the parameters have been reduced in order to allow the students to operate the cipher with paper and pencil rather than a computer…”
Get full text
Journal Article