[PDF][PDF] A review of modern DNA-based steganography approaches
OH Alhabeeb, F Fauzi… - International Journal of …, 2021 - pdfs.semanticscholar.org
In the last two decades, the field of DNA-based steganography has emerged as a promising
domain to provide security for sensitive information transmitted over an untrusted channel …
domain to provide security for sensitive information transmitted over an untrusted channel …
Provably-secure led block cipher diffusion and confusion based on chaotic maps
HM Al-Saadi, I Alshawi - Informatica, 2023 - informatica.si
Lightweight cryptography algorithms have concentrated on key generation's randomness,
unpredictable nature, and complexity to improve the resistance of ciphers. Therefore, the key …
unpredictable nature, and complexity to improve the resistance of ciphers. Therefore, the key …
Improved Salsa20 stream cipher diffusion based on random chaotic maps
I Alshawi, L Muhalhal - Informatica, 2022 - informatica.si
To enhance stream ciphers, numerous studies have concentrated on the randomness,
unpredictable nature, and complexity of keystream. Numerous stream algorithms have been …
unpredictable nature, and complexity of keystream. Numerous stream algorithms have been …
Novel Dual-Domain Chaotic Image Cryptosystem for Cybersecurity Applications
The secrecy of various forms of multimedia data constitutes a significant aspect of the
cybersecurity field. In this case, chaos-based image ciphers can be adapted. Chaotic image …
cybersecurity field. In this case, chaos-based image ciphers can be adapted. Chaotic image …
Developing a novel DNA-based steganography algorithm using random table generation with segmentation
OH Alhabeeb, F Fauzi, R Sulaiman - Multimedia Tools and Applications, 2024 - Springer
Genome steganography has emerged as a promising field for transmitting large amounts of
data over an untrusted channel in the last two decades. DNA has many advantages over …
data over an untrusted channel in the last two decades. DNA has many advantages over …
Analysis and comparison of symmetric key cryptographic algorithms on FPGA
R Anusha, N Shankari, VS Shetty… - 2022 4th International …, 2022 - ieeexplore.ieee.org
Data security is considered as one of the prime concern for every communication systems.
Cryptography has come up as a resolution which plays a dynamic role in data security …
Cryptography has come up as a resolution which plays a dynamic role in data security …
Design flow of Blowfish symmetric-key block cipher on FPGA
P Palka, RA Perez, T Fang… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Cryptography is an essential topic for modern digital systems. In the past two decades,
FPGA-based encryptions has proved to be effective. Through this project, we explore a …
FPGA-based encryptions has proved to be effective. Through this project, we explore a …
A Systematic Literature Review on Symmetric and Asymmetric Encryption Comparison Key Size
M Althamir, A Alabdulhay… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
Symmetric and asymmetric encryption methods are used when a web browser is used to
reply to emails, submit website forms, and perform similar activities. Key size is essential to …
reply to emails, submit website forms, and perform similar activities. Key size is essential to …
密碼學在交互式零知識證明協定之應用
WH Kao - 中原大學電機工程學系學位論文, 2021 - airitilibrary.com
In this thesis, we propose zero-knowledge proof protocols based on three types of
cryptosystems. Transmitting encrypted or unencrypted messages through both parties, it …
cryptosystems. Transmitting encrypted or unencrypted messages through both parties, it …