[PDF][PDF] Cryptanalysis of Lightweight Trigonometric Encryption Algorithms
D Lucas, B Elisha, E Rusell, F Louis, K Hubert - 2024 - researchgate.net
With the increasing demand for secure and efficient encryption algorithms in the era of
digital communication, lightweight encryption schemes have gained significant attention due …
digital communication, lightweight encryption schemes have gained significant attention due …
[PDF][PDF] Trigonometric Functions in Cryptography: Exploring the Use of Sine, Cosine, and Tangent for Encryption
O Marvellous, E Rusell, F Louis - 2024 - researchgate.net
Cryptography plays a crucial role in ensuring secure communication and data protection in
various domains. Traditional cryptographic algorithms often rely on mathematical operations …
various domains. Traditional cryptographic algorithms often rely on mathematical operations …
[PDF][PDF] Novel Approaches to Short Message Encryption using Trigonometric Functions
B Elisha, K Hubert, D Lucas, F Louis - 2024 - researchgate.net
The rapid advancement of communication technologies has led to an exponential increase
in the exchange of sensitive information through short messages. As a result, ensuring the …
in the exchange of sensitive information through short messages. As a result, ensuring the …
[PDF][PDF] Security Analysis of Trigonometry-Based Encryption Schemes for Short Messages.
K Hubert, D Lucas, F Louis - 2024 - researchgate.net
Trigonometry-based encryption schemes have gained attention as a potential alternative to
traditional cryptographic algorithms for securing short messages. These schemes leverage …
traditional cryptographic algorithms for securing short messages. These schemes leverage …
[PDF][PDF] Hardware Implementation of Trigonometry-Based Encryption for IoT Devices
D Lucas, B Elisha, E Rusell, K Hubert, F Louis - 2024 - researchgate.net
The widespread adoption of Internet of Things (IoT) devices has brought about significant
concerns regarding their security and privacy. As IoT devices collect and transmit sensitive …
concerns regarding their security and privacy. As IoT devices collect and transmit sensitive …
[PDF][PDF] Performance Evaluation of Trigonometry-Based Encryption Algorithms for Resource-Constrained Devices
E Rusell, B Elisha, F Louis - 2024 - researchgate.net
The widespread adoption of resource-constrained devices, such as Internet of Things (IoT)
devices and embedded systems, has necessitated the development of encryption algorithms …
devices and embedded systems, has necessitated the development of encryption algorithms …
[PDF][PDF] Comparative Study of Trigonometric and Conventional Cryptographic Algorithms for Short Message Encryption
K Hubert, D Lucas, F Louis - 2024 - researchgate.net
Cryptographic algorithms play a crucial role in ensuring the security and privacy of sensitive
information in various fields, including communication systems, financial transactions, and …
information in various fields, including communication systems, financial transactions, and …
[PDF][PDF] Trigonometry-Based Cryptography for Secure Communication in Wireless Sensor Networks
D Lucas, B Elisha, E Rusell, K Hubert, F Louis - 2024 - researchgate.net
Abstract Wireless Sensor Networks (WSNs) have gained significant attention due to their
wide range of applications, including environmental monitoring, healthcare, and industrial …
wide range of applications, including environmental monitoring, healthcare, and industrial …
[PDF][PDF] Efficient Key Management Schemes for Trigonometry-Based Encryption of Short Messages
D Lucas, B Elisha, E Rusell, K Hubert, F Louis - 2024 - researchgate.net
As the need for secure communication continues to grow in the digital era, the development
of efficient encryption schemes has become crucial. Trigonometry-based encryption has …
of efficient encryption schemes has become crucial. Trigonometry-based encryption has …
[PDF][PDF] Design and Implementation of a Lightweight Cryptographic Algorithm Utilizing Trigonometric Principles
O Marvellous, B Elisha, F Louis - 2024 - researchgate.net
The design and implementation of lightweight cryptographic algorithms have gained
significant importance in recent years due to the increasing demand for secure …
significant importance in recent years due to the increasing demand for secure …