[PDF][PDF] A review of modern DNA-based steganography approaches

OH Alhabeeb, F Fauzi… - International Journal of …, 2021 - pdfs.semanticscholar.org
In the last two decades, the field of DNA-based steganography has emerged as a promising
domain to provide security for sensitive information transmitted over an untrusted channel …

Provably-secure led block cipher diffusion and confusion based on chaotic maps

HM Al-Saadi, I Alshawi - Informatica, 2023 - informatica.si
Lightweight cryptography algorithms have concentrated on key generation's randomness,
unpredictable nature, and complexity to improve the resistance of ciphers. Therefore, the key …

Improved Salsa20 stream cipher diffusion based on random chaotic maps

I Alshawi, L Muhalhal - Informatica, 2022 - informatica.si
To enhance stream ciphers, numerous studies have concentrated on the randomness,
unpredictable nature, and complexity of keystream. Numerous stream algorithms have been …

Novel Dual-Domain Chaotic Image Cryptosystem for Cybersecurity Applications

MYM Yassin, AA Nasir, M Taha - IEEE Access, 2024 - ieeexplore.ieee.org
The secrecy of various forms of multimedia data constitutes a significant aspect of the
cybersecurity field. In this case, chaos-based image ciphers can be adapted. Chaotic image …

Developing a novel DNA-based steganography algorithm using random table generation with segmentation

OH Alhabeeb, F Fauzi, R Sulaiman - Multimedia Tools and Applications, 2024 - Springer
Genome steganography has emerged as a promising field for transmitting large amounts of
data over an untrusted channel in the last two decades. DNA has many advantages over …

Analysis and comparison of symmetric key cryptographic algorithms on FPGA

R Anusha, N Shankari, VS Shetty… - 2022 4th International …, 2022 - ieeexplore.ieee.org
Data security is considered as one of the prime concern for every communication systems.
Cryptography has come up as a resolution which plays a dynamic role in data security …

Design flow of Blowfish symmetric-key block cipher on FPGA

P Palka, RA Perez, T Fang… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Cryptography is an essential topic for modern digital systems. In the past two decades,
FPGA-based encryptions has proved to be effective. Through this project, we explore a …

A Systematic Literature Review on Symmetric and Asymmetric Encryption Comparison Key Size

M Althamir, A Alabdulhay… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
Symmetric and asymmetric encryption methods are used when a web browser is used to
reply to emails, submit website forms, and perform similar activities. Key size is essential to …

密碼學在交互式零知識證明協定之應用

WH Kao - 中原大學電機工程學系學位論文, 2021 - airitilibrary.com
In this thesis, we propose zero-knowledge proof protocols based on three types of
cryptosystems. Transmitting encrypted or unencrypted messages through both parties, it …