Security Analysis Techniques Using Differential Relationships For Block Ciphers
The uses of block cipher has become crucial in nowadays’ computing era as well as the information security. Information must be available only for authenticated and authorized users.However,flaws and weaknesses in the cryptosystem can breach the security of stored and transmitted information.A weak...
| Main Author: | Buja, Alya Geogiana |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/23343/ http://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=113287 |
| Abstract | Abstract here |
Similar Items
A Machine Learning Approach To Evaluate The Security Of Ultra-lightweight Block Ciphers
by: Lee, Ting Rong
Published: (2021)
by: Lee, Ting Rong
Published: (2021)
The Construction Of Quantum Block Cipher For Grover Algorithm
by: Eid, Almazrooie Mishal
Published: (2018)
by: Eid, Almazrooie Mishal
Published: (2018)
Parallel Platform For New Secure Stream Ciphers Based On Np-hard Problems
by: Mohammad A. Suwais, Khaled
Published: (2009)
by: Mohammad A. Suwais, Khaled
Published: (2009)
Field programmable gate array based sigmoid function implementation using differential lookup table and second order nonlinear function
by: Syahrulanuar, Ngah
Published: (2021)
by: Syahrulanuar, Ngah
Published: (2021)
An enhanced next generation security operation center framework for information system security management
by: Yau, Ti Dun
Published: (2023)
by: Yau, Ti Dun
Published: (2023)
Frame selection based on modified entropy and object motion for secured data hiding in videos
by: Muhammad Fuad, Abdullah
Published: (2021)
by: Muhammad Fuad, Abdullah
Published: (2021)
Dynamic determinant matrix-based block cipher algorithm
by: Juremi, Julia
Published: (2018)
by: Juremi, Julia
Published: (2018)
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
by: Akhyari, Nasir
Published: (2019)
by: Akhyari, Nasir
Published: (2019)
A secure and efficient revocation protocol for group signatures in vehicular ad hoc networks / Nur Fadhilah Mohd Shari
by: Nur Fadhilah , Mohd Shari
Published: (2018)
by: Nur Fadhilah , Mohd Shari
Published: (2018)
Hazard analysis for the requirements specification of safety-critical systems using the combination of FHA and FTA techniques
by: Kiriyadhatshini, Gunaratnam
Published: (2023)
by: Kiriyadhatshini, Gunaratnam
Published: (2023)
Optimising acoustic features for source mobile device identification using spectral analysis techniques / Mehdi Jahanirad
by: Mehdi , Jahanirad
Published: (2016)
by: Mehdi , Jahanirad
Published: (2016)
Active queue management for assured forwarding traffic in differentiated services network / Ng Eng Seong
by: Ng , Eng Seong
Published: (2004)
by: Ng , Eng Seong
Published: (2004)
Secure policies for the distributed virtual machines in mobile cloud computing
by: Annane, Boubakeur
Published: (2020)
by: Annane, Boubakeur
Published: (2020)
Shoulder surfing security threat prevention using shifting directions / Tey Boon Hau
by: Tey, Boon Hau
Published: (2018)
by: Tey, Boon Hau
Published: (2018)
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
by: Nur Alya Afikah, Usop
Published: (2024)
by: Nur Alya Afikah, Usop
Published: (2024)
A security framework for mobile health applications on android platform / Muzammil Hussain
by: Muzammil , Hussain
Published: (2017)
by: Muzammil , Hussain
Published: (2017)
Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication
by: Yasir, Javed
Published: (2020)
by: Yasir, Javed
Published: (2020)
Relationship between employability and graduate’s competencies based on programme learning outcomes analysis
by: Wan Nor Afiqah, Wan Othman
Published: (2020)
by: Wan Nor Afiqah, Wan Othman
Published: (2020)
A secure approach for health information exchange using mobile personal health records / Mohamed Shabbir Hamza Abdulnabi
by: Mohamed Shabbir Hamza , Abdulnabi
Published: (2018)
by: Mohamed Shabbir Hamza , Abdulnabi
Published: (2018)
The hybrid feature selection technique using term frequency-inverse document frequency and support vector machine-recursive feature elimination for sentiment classification
by: Nur Syafiqah, Mohd Nafis
Published: (2022)
by: Nur Syafiqah, Mohd Nafis
Published: (2022)
A secure pin-entry method resistant to shoulder-surfing and recording attacks / Farid Binbeshr
by: Farid , Binbeshr
Published: (2022)
by: Farid , Binbeshr
Published: (2022)
A lightweight key management framework for secure dynamic group based applications / Salman Iqbal Malik
by: Salman Iqbal , Malik
Published: (2017)
by: Salman Iqbal , Malik
Published: (2017)
Enhancing Security in Mobile IPv6 with Private Key-Based Binding Update Protocol / Hero Modares
by: Modares, Hero
Published: (2013)
by: Modares, Hero
Published: (2013)
A scalable and secure position-based routing protocol for ad-hoc networks / Liana K. M. Qabajeh
by: Qabajeh, Liana K. M.
Published: (2012)
by: Qabajeh, Liana K. M.
Published: (2012)
A DNA Based Lightweight Cryptography Framework Integrating ECC and RNN Based Deep Learning for IoT Security
by: Sehrish, Aqeel
Published: (2025)
by: Sehrish, Aqeel
Published: (2025)
Human action recognition using slow feature analysis / Bardia Yousefi
by: Bardia, Yousefi
Published: (2016)
by: Bardia, Yousefi
Published: (2016)
A novel secure mud-based real time intrusion detection and prevention mechanism for IoT network / Noman Mazhar
by: Noman , Mazhar
Published: (2023)
by: Noman , Mazhar
Published: (2023)
An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
Increasing data anonymity using privacy techniques and advanced encryption standard
by: Thamer, Khalil Esmeel
Published: (2020)
by: Thamer, Khalil Esmeel
Published: (2020)
A model of software component interactions using the call graph technique
by: Nooraini, Ismail
Published: (2013)
by: Nooraini, Ismail
Published: (2013)
Enhancement of lightweight block cipher algorithms
by: Al-Dabbagh, Sufyan Salim Mahmood
Published: (2024)
by: Al-Dabbagh, Sufyan Salim Mahmood
Published: (2024)
An enhanced soft set data reduction using decision partition order technique
by: Mohammed, Mohammed Adam Taheir
Published: (2017)
by: Mohammed, Mohammed Adam Taheir
Published: (2017)
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
by: Hassan Disina, Abdulkadir
Published: (2018)
by: Hassan Disina, Abdulkadir
Published: (2018)
Visual analysis of dense crowds / Kok Ven Jyn
by: Kok , Ven Jyn
Published: (2016)
by: Kok , Ven Jyn
Published: (2016)
Prediction Of Petroleum Reservoir Properties Using Nonlinear Feature Selection And Ensembles Of Computational Intelligence Techniques
by: Anifowose, Fatai Adesina
Published: (2015)
by: Anifowose, Fatai Adesina
Published: (2015)
A tree based keyphrase extraction technique for academic literature
by: Rabby, Gollam
Published: (2019)
by: Rabby, Gollam
Published: (2019)
A development of a cancer information system by using information retrieval techniques / Tan Chee Ming
by: Tan, Chee Ming
Published: (2006)
by: Tan, Chee Ming
Published: (2006)
Contextual personalized recommendation technique for academic event selection / Parukutty Raman
by: Parukutty , Raman
Published: (2018)
by: Parukutty , Raman
Published: (2018)
An automatic technique for Malaysian number plate recognition / Mojeed Salmon Olatunde
by: Mojeed Salmon, Olatunde
Published: (2018)
by: Mojeed Salmon, Olatunde
Published: (2018)
A new multi-frames watermarking technique for tamper detection and recovery
by: Khor, Hui Liang
Published: (2017)
by: Khor, Hui Liang
Published: (2017)
Similar Items
-
A Machine Learning Approach To Evaluate The Security Of Ultra-lightweight Block Ciphers
by: Lee, Ting Rong
Published: (2021) -
The Construction Of Quantum Block Cipher For Grover Algorithm
by: Eid, Almazrooie Mishal
Published: (2018) -
Parallel Platform For New Secure Stream Ciphers Based On Np-hard Problems
by: Mohammad A. Suwais, Khaled
Published: (2009) -
Field programmable gate array based sigmoid function implementation using differential lookup table and second order nonlinear function
by: Syahrulanuar, Ngah
Published: (2021) -
An enhanced next generation security operation center framework for information system security management
by: Yau, Ti Dun
Published: (2023)