Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Cryptographic ciphers depend on how quickly the key affects the output of the ciphers (ciphertext). Keys are traditionally generated from small size input (seed) to a bigger size random key(s). Key scheduling algorithm (KSA) is the mechanism that generates and schedules all sub-keys for each round o...
| Main Author: | Hassan Disina, Abdulkadir |
|---|---|
| Format: | Thesis |
| Language: | English English English |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/145/ |
| Abstract | Abstract here |
Similar Items
Enhance key generation algorithm based user string identity as public key
by: Norhidayah, Muhammad
Published: (2015)
by: Norhidayah, Muhammad
Published: (2015)
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
by: Norulazmi, Kasim
Published: (2008)
by: Norulazmi, Kasim
Published: (2008)
The Construction Of Quantum Block Cipher For Grover Algorithm
by: Eid, Almazrooie Mishal
Published: (2018)
by: Eid, Almazrooie Mishal
Published: (2018)
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008)
by: Wahid, Norfaradilla
Published: (2008)
Scheduling Algorithm For Lot Movement in Semiconductor Wafer Fabrication
by: Norzieyuswati, Md Zenal
Published: (2008)
by: Norzieyuswati, Md Zenal
Published: (2008)
Optimization grid scheduling with priority base and bees algorithm
by: Ahmed, Mohammed Shihab
Published: (2014)
by: Ahmed, Mohammed Shihab
Published: (2014)
Dynamic determinant matrix-based block cipher algorithm
by: Juremi, Julia
Published: (2018)
by: Juremi, Julia
Published: (2018)
An Improved Linear Feedback Shift Register (LFSR- based) Stream Cipher Generator
by: Mahdi, Reyadh H
Published: (2009)
by: Mahdi, Reyadh H
Published: (2009)
Securing cloud data system (SCDS) for key exposure using AES algorithm
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks
by: Said, Mohamed Abdisalan
Published: (2015)
by: Said, Mohamed Abdisalan
Published: (2015)
Compressing Images Using Multi-Level Wavelet Transform Algorithm (MWTA)
by: Odeh, Ali Ahmad Alabd Abu
Published: (2012)
by: Odeh, Ali Ahmad Alabd Abu
Published: (2012)
A Machine Learning Approach To Evaluate The Security Of Ultra-lightweight Block Ciphers
by: Lee, Ting Rong
Published: (2021)
by: Lee, Ting Rong
Published: (2021)
An adaptive QOS scheduling algorithm in service oriented grid and cloud environment / Ang Tan Fong
by: Ang, Tan Fong
Published: (2011)
by: Ang, Tan Fong
Published: (2011)
An analysis of a private-key cryptosystem / by Tan Wei-Wey.
by: Tan, Wei-Wey
Published: (2002)
by: Tan, Wei-Wey
Published: (2002)
Efficient dynamic DNA-based block cipher algorithm
by: Chng, Chern Wei
Published: (2023)
by: Chng, Chern Wei
Published: (2023)
Scheduling Examination Faculty Information Technology in UUM
by: Alsmadi, Hamzeh Mohammad Hussein
Published: (2008)
by: Alsmadi, Hamzeh Mohammad Hussein
Published: (2008)
Course Time Table Scheduling for a Local College
by: Lee, Su Leong
Published: (2009)
by: Lee, Su Leong
Published: (2009)
Tasks and User Performance Improvement for UUM Online Payment Using Key Stroke Level Model
by: Al-tawalbeh, Manal Ata
Published: (2009)
by: Al-tawalbeh, Manal Ata
Published: (2009)
Multi-Tap Mobile Phone Text Entry : Key-Press Operators For Keystroke Level Model
by: Srour, Ayman I. H.
Published: (2008)
by: Srour, Ayman I. H.
Published: (2008)
A new scheduling technique to improve data management in cloud computing
by: Khan, Nawsher
Published: (2013)
by: Khan, Nawsher
Published: (2013)
Parallel Quick-Skip Search Hybrid Algorithm For The Exact String Matching Problem.
by: Naser, Mustafa Abdulsahib
Published: (2010)
by: Naser, Mustafa Abdulsahib
Published: (2010)
Security Issues In Shared Key Authentication on IEEE 802.11 Wireless Standards and UUM Wireless Network.
by: El Omari, Abdullah Abdelmonem M.
Published: (2007)
by: El Omari, Abdullah Abdelmonem M.
Published: (2007)
Web Based Timetable Scheduling System For Applied Sciences at the College of Arts and Sciences (CAS)
by: Al-zou'bi, Sari Mahmoud Ali
Published: (2008)
by: Al-zou'bi, Sari Mahmoud Ali
Published: (2008)
Statistical analysis on enhanced 3D-AES block cipher cryptographic algorithm / Nor Azeala Mohd Yusof
by: Mohd Yusof, Nor Azeala
Published: (2021)
by: Mohd Yusof, Nor Azeala
Published: (2021)
Dynamic fast local Laplacian completed local ternary pattern (dynamic FLapCLTP) for face recognition
by: Sam, Yin Yee
Published: (2020)
by: Sam, Yin Yee
Published: (2020)
Improving The Algorithm To Detect Internet Worms
by: Rasheed, Mohmmad M
Published: (2008)
by: Rasheed, Mohmmad M
Published: (2008)
Stemming Algorithm in Searching Malay Text
by: Rizauddin, Saian
Published: (2004)
by: Rizauddin, Saian
Published: (2004)
Analyzing DNA Sequences Using Clustering Algorithm
by: Alhersh, Taha Talib Ragheb
Published: (2009)
by: Alhersh, Taha Talib Ragheb
Published: (2009)
Test data generation method for dynamic - structural testing in automatic programming assessment
by: Sarker, Md. Shahadath
Published: (2016)
by: Sarker, Md. Shahadath
Published: (2016)
Performance Comparison of Parallel Bees Algorithm on Rosenbrock Function
by: Hammash, Nayif Mohammed
Published: (2012)
by: Hammash, Nayif Mohammed
Published: (2012)
Hybrid BLEU Algorithm For Structured Exam Management System
by: Zulhana, Zulkifle
Published: (2008)
by: Zulhana, Zulkifle
Published: (2008)
Product Recommendation for E-Groceries Using Apriori Algorithm
by: Muziah, Muhammad
Published: (2004)
by: Muziah, Muhammad
Published: (2004)
Hybrid harmony search algorithm for continuous optimization problems
by: Ala’a Atallah, Hamad Alomoush
Published: (2020)
by: Ala’a Atallah, Hamad Alomoush
Published: (2020)
Bats echolocation-inspired algorithms for global optimisation problems
by: Nafrizuan, Mat Yahya
Published: (2016)
by: Nafrizuan, Mat Yahya
Published: (2016)
A block cipher based on genetic algorithm
by: Zakaria, Nur Hafiza
Published: (2016)
by: Zakaria, Nur Hafiza
Published: (2016)
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019)
by: Ali, Mohammed Ahnaf
Published: (2019)
Malaysia network transit route adviser: hybrid didistra's algorithm
by: Mohd Syafiq, Bachok
Published: (2014)
by: Mohd Syafiq, Bachok
Published: (2014)
Optimization of ship routing using hybrid genetic algorithm / Ismail
by: ., Ismail
Published: (2014)
by: ., Ismail
Published: (2014)
Designing substitution boxes based on chaotic map and globalized firefly algorithm
by: Ahmed, Hussam Alddin Shihab
Published: (2019)
by: Ahmed, Hussam Alddin Shihab
Published: (2019)
PMT : opposition based learning technique for enhancing metaheuristic algorithms performance
by: Hammoudeh, S. Alamri
Published: (2020)
by: Hammoudeh, S. Alamri
Published: (2020)
Similar Items
-
Enhance key generation algorithm based user string identity as public key
by: Norhidayah, Muhammad
Published: (2015) -
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
by: Norulazmi, Kasim
Published: (2008) -
The Construction Of Quantum Block Cipher For Grover Algorithm
by: Eid, Almazrooie Mishal
Published: (2018) -
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008) -
Scheduling Algorithm For Lot Movement in Semiconductor Wafer Fabrication
by: Norzieyuswati, Md Zenal
Published: (2008)