Search Results - Feistel-based symmetric encryption algorithm

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Privacy-Preserving Image Protection in Cloud Computing Using Intelligent Encryption by Mohamoud, Asad Hassan, Gupta, Ganesh, Kumar, Anuj

    Published: IEEE 05.06.2024
    “… paper addresses the critical issue of image privacy in cloud computing environments and proposes a novel approach for privacy-preserving image protection through the integration of intelligent encryption techniques…”
    Get full text
    Conference Proceeding
  2. 2

    Novel Algorithm in Symmetric Encryption (NASE): Based on Feistel Cipher by Bani Baker, Safiah I., Al-Hamami, Alaa Hussein

    Published: IEEE 01.10.2017
    “… In the present paper, we propose NASE as a Novel Algorithm in Symmetric Encryption based on the Feistel Cipher structure with newly added features that will enhance the security of the encrypted data…”
    Get full text
    Conference Proceeding
  3. 3

    A Light-weight Symmetric Encryption Algorithm Based on Feistel Cryptosystem Structure by Jingli, Zheng, Zhengbing, Hu, Chuiwei, Lu

    ISSN: 2074-9090, 2074-9104
    Published: Hong Kong Modern Education and Computer Science Press 08.12.2014
    “… for them. The paper proposed a light-level symmetrical encryption algorithm: LWSEA, which adopt minor encryption rounds, shorter data packet and simplified scrambling function…”
    Get full text
    Journal Article
  4. 4

    Working Out the New Algorithm Enciphered the Data with a Symmetric Key by Umarov, Shukhrat A., Akbarov, Davlatali E.

    ISSN: 1999-494X, 2313-6057
    Published: Krasnoyarsk Siberian Federal University 01.03.2016
    “…In this article, data encryption algorithm with symmetric key which uses combination of practically irreversible transformations is described…”
    Get full text
    Journal Article
  5. 5

    End-to-End Encryption in Resource-Constrained IoT Device by Alluhaidan, Ala Saleh D., Prabu, P.

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 2023
    Published in IEEE access (2023)
    “… The algorithm used for secure encryption should protect vulnerable devices. Conventional encryption methods such as RSA or AES are computationally…”
    Get full text
    Journal Article
  6. 6

    Secure Force: A low-complexity cryptographic algorithm for Wireless Sensor Network (WSN) by Ebrahim, Mansoor, Chai Wai Chong

    Published: IEEE 01.11.2013
    “… In this paper, a low-complexity symmetric cryptographic algorithm, denoted as Secure Force (SF), is proposed. It is developed based on the Feistel structure…”
    Get full text
    Conference Proceeding