Quantum cryptography technique: A way to improve security challenges in mobile cloud computing (MCC)
S Abidin, A Swami, E Ramirez-Asís… - Materials Today …, 2022 - Elsevier
Quantum cryptography concentrates on the solution of cryptography that is imperishable due
to the reason of fortification of secrecy which is applied to the public key distribution of …
to the reason of fortification of secrecy which is applied to the public key distribution of …
A novel approach for the development of the Twofish algorithm based on multi-level key space
This paper presents a new modification of the Twofish algorithm for strengthening security.
This is done by using two additional control keys during 16 rounds of the standard Feistel …
This is done by using two additional control keys during 16 rounds of the standard Feistel …
New method for improving add round key in the advanced encryption standard algorithm
This paper proposes a new modification to the AES in order to ensure a high-level security.
This is accomplished by replacing the binary Exclusive OR (XOR) operation in each add …
This is accomplished by replacing the binary Exclusive OR (XOR) operation in each add …
[PDF][PDF] A modification on key stream generator for RC4 algorithm
Engineering and Technology Journal A Modification on Key Stream Generator for RC4
Algorithm Page 1 Engineering and Technology Journal Vol. 38, Part B (2020), No. ٠٢, Pages …
Algorithm Page 1 Engineering and Technology Journal Vol. 38, Part B (2020), No. ٠٢, Pages …
[HTML][HTML] A new modified DES algorithm based on the development of binary encryption functions
HKA Alsuwaiedi, AMS Rahma - Journal of King Saud University-Computer …, 2023 - Elsevier
One of the most commonly used symmetric encryption methods is the Data Encryption
Standard (DES), but it has a number of flaws. For instance, the encryption method only …
Standard (DES), but it has a number of flaws. For instance, the encryption method only …
[PDF][PDF] Image Encryption Based on Multi-Level Keys on RC5 Algorithm.
In recent years, the need to develop encryption algorithms has led to an increase in the
working and efficiency of algorithms to protect the transmission and reception of information …
working and efficiency of algorithms to protect the transmission and reception of information …
A new approach for data hiding with LSB steganography
G Prashanti, K Sandhyarani - Emerging ICT for Bridging the Future …, 2015 - Springer
Steganography is the art of hiding data into a media in such a way that the presence of data
can't be detected when the communication is taking place. This paper provides a review of …
can't be detected when the communication is taking place. This paper provides a review of …
An improvement for CAST-128 encryption based on magic square and matrix inversion
This paper presents two image encryption methods which aim to improve the CAST 128-bit
algorithm by increasing the security level of encrypted images. The first improvement uses a …
algorithm by increasing the security level of encrypted images. The first improvement uses a …
[PDF][PDF] New Approach for Modifying Blowfish Algorithm by Using Multiple Keys
AMA Al-Neaimi, RF Hassan - IJCSNS, 2011 - zuj.edu.jo
In this paper, cellular automata (CAs) are used to design a symmetric key cryptography
system based on Bluefish algorithm, CAs are applied to generate a multiple pseudo-random …
system based on Bluefish algorithm, CAs are applied to generate a multiple pseudo-random …
A new multi-level key block cypher based on the Blowfish algorithm
Blowfish is a block cypher algorithm used in many applications to enhance security, but it
includes several drawbacks. For example, the mix between the key and data is limited. This …
includes several drawbacks. For example, the mix between the key and data is limited. This …