Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Cryptographic ciphers depend on how quickly the key affects the output of the ciphers (ciphertext). Keys are traditionally generated from small size input (seed) to a bigger size random key(s). Key scheduling algorithm (KSA) is the mechanism that generates and schedules all sub-keys for each round o...
| Main Author: | Hassan Disina, Abdulkadir |
|---|---|
| Format: | Thesis |
| Language: | English English English |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/145/ |
| Abstract | Abstract here |
Similar Items
Enhance key generation algorithm based user string identity as public key
by: Norhidayah, Muhammad
Published: (2015)
by: Norhidayah, Muhammad
Published: (2015)
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
by: Norulazmi, Kasim
Published: (2008)
by: Norulazmi, Kasim
Published: (2008)
The Construction Of Quantum Block Cipher For Grover Algorithm
by: Eid, Almazrooie Mishal
Published: (2018)
by: Eid, Almazrooie Mishal
Published: (2018)
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008)
by: Wahid, Norfaradilla
Published: (2008)
Scheduling Algorithm For Lot Movement in Semiconductor Wafer Fabrication
by: Norzieyuswati, Md Zenal
Published: (2008)
by: Norzieyuswati, Md Zenal
Published: (2008)
Optimization grid scheduling with priority base and bees algorithm
by: Ahmed, Mohammed Shihab
Published: (2014)
by: Ahmed, Mohammed Shihab
Published: (2014)
Investigation of block matching algorithm for video coding
by: Faizul Hadi Mohamad Jamil
Published: (2013)
by: Faizul Hadi Mohamad Jamil
Published: (2013)
An Improved Linear Feedback Shift Register (LFSR- based) Stream Cipher Generator
by: Mahdi, Reyadh H
Published: (2009)
by: Mahdi, Reyadh H
Published: (2009)
Securing cloud data system (SCDS) for key exposure using AES algorithm
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
Dynamic determinant matrix-based block cipher algorithm
by: Juremi, Julia
Published: (2018)
by: Juremi, Julia
Published: (2018)
Efficient dynamic DNA-based block cipher algorithm
by: Chng, Chern Wei
Published: (2023)
by: Chng, Chern Wei
Published: (2023)
A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks
by: Said, Mohamed Abdisalan
Published: (2015)
by: Said, Mohamed Abdisalan
Published: (2015)
Compressing Images Using Multi-Level Wavelet Transform Algorithm (MWTA)
by: Odeh, Ali Ahmad Alabd Abu
Published: (2012)
by: Odeh, Ali Ahmad Alabd Abu
Published: (2012)
An adaptive QOS scheduling algorithm in service oriented grid and cloud environment / Ang Tan Fong
by: Ang, Tan Fong
Published: (2011)
by: Ang, Tan Fong
Published: (2011)
Full dynamic transformation model for spatial data from relational database to object-oriented database
by: Siew, Teck Kiong
Published: (2005)
by: Siew, Teck Kiong
Published: (2005)
Statistical analysis on enhanced 3D-AES block cipher cryptographic algorithm / Nor Azeala Mohd Yusof
by: Mohd Yusof, Nor Azeala
Published: (2021)
by: Mohd Yusof, Nor Azeala
Published: (2021)
A Machine Learning Approach To Evaluate The Security Of Ultra-lightweight Block Ciphers
by: Lee, Ting Rong
Published: (2021)
by: Lee, Ting Rong
Published: (2021)
Scheduling Examination Faculty Information Technology in UUM
by: Alsmadi, Hamzeh Mohammad Hussein
Published: (2008)
by: Alsmadi, Hamzeh Mohammad Hussein
Published: (2008)
Enhancement of lightweight block cipher algorithms
by: Al-Dabbagh, Sufyan Salim Mahmood
Published: (2024)
by: Al-Dabbagh, Sufyan Salim Mahmood
Published: (2024)
An analysis of a private-key cryptosystem / by Tan Wei-Wey.
by: Tan, Wei-Wey
Published: (2002)
by: Tan, Wei-Wey
Published: (2002)
Course Time Table Scheduling for a Local College
by: Lee, Su Leong
Published: (2009)
by: Lee, Su Leong
Published: (2009)
A new scheduling technique to improve data management in cloud computing
by: Khan, Nawsher
Published: (2013)
by: Khan, Nawsher
Published: (2013)
A block cipher based on genetic algorithm
by: Zakaria, Nur Hafiza
Published: (2016)
by: Zakaria, Nur Hafiza
Published: (2016)
Multi-Tap Mobile Phone Text Entry : Key-Press Operators For Keystroke Level Model
by: Srour, Ayman I. H.
Published: (2008)
by: Srour, Ayman I. H.
Published: (2008)
Tasks and User Performance Improvement for UUM Online Payment Using Key Stroke Level Model
by: Al-tawalbeh, Manal Ata
Published: (2009)
by: Al-tawalbeh, Manal Ata
Published: (2009)
Web Based Timetable Scheduling System For Applied Sciences at the College of Arts and Sciences (CAS)
by: Al-zou'bi, Sari Mahmoud Ali
Published: (2008)
by: Al-zou'bi, Sari Mahmoud Ali
Published: (2008)
Parallel Quick-Skip Search Hybrid Algorithm For The Exact String Matching Problem.
by: Naser, Mustafa Abdulsahib
Published: (2010)
by: Naser, Mustafa Abdulsahib
Published: (2010)
Security Issues In Shared Key Authentication on IEEE 802.11 Wireless Standards and UUM Wireless Network.
by: El Omari, Abdullah Abdelmonem M.
Published: (2007)
by: El Omari, Abdullah Abdelmonem M.
Published: (2007)
An embedded dynamic querying system
by: Ong, Chooi Sim
Published: (1995)
by: Ong, Chooi Sim
Published: (1995)
Dynamic fast local Laplacian completed local ternary pattern (dynamic FLapCLTP) for face recognition
by: Sam, Yin Yee
Published: (2020)
by: Sam, Yin Yee
Published: (2020)
A novel algorithm : apriori-ant. The combination of apriori algorithm and ants colony optimization algorithm
by: Choo, Ai Ling
Published: (2005)
by: Choo, Ai Ling
Published: (2005)
Stemming Algorithm in Searching Malay Text
by: Rizauddin, Saian
Published: (2004)
by: Rizauddin, Saian
Published: (2004)
Improving The Algorithm To Detect Internet Worms
by: Rasheed, Mohmmad M
Published: (2008)
by: Rasheed, Mohmmad M
Published: (2008)
Test data generation method for dynamic - structural testing in automatic programming assessment
by: Sarker, Md. Shahadath
Published: (2016)
by: Sarker, Md. Shahadath
Published: (2016)
Security Analysis Techniques Using Differential Relationships For Block Ciphers
by: Buja, Alya Geogiana
Published: (2018)
by: Buja, Alya Geogiana
Published: (2018)
Analyzing DNA Sequences Using Clustering Algorithm
by: Alhersh, Taha Talib Ragheb
Published: (2009)
by: Alhersh, Taha Talib Ragheb
Published: (2009)
A fuzzy logic approach for improved hough transform to extract cadastral symbol from Malaysian cadastral map
by: Chai, Ted Sing
Published: (2002)
by: Chai, Ted Sing
Published: (2002)
Product Recommendation for E-Groceries Using Apriori Algorithm
by: Muziah, Muhammad
Published: (2004)
by: Muziah, Muhammad
Published: (2004)
Hybrid BLEU Algorithm For Structured Exam Management System
by: Zulhana, Zulkifle
Published: (2008)
by: Zulhana, Zulkifle
Published: (2008)
Hybrid harmony search algorithm for continuous optimization problems
by: Ala’a Atallah, Hamad Alomoush
Published: (2020)
by: Ala’a Atallah, Hamad Alomoush
Published: (2020)
Similar Items
-
Enhance key generation algorithm based user string identity as public key
by: Norhidayah, Muhammad
Published: (2015) -
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
by: Norulazmi, Kasim
Published: (2008) -
The Construction Of Quantum Block Cipher For Grover Algorithm
by: Eid, Almazrooie Mishal
Published: (2018) -
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008) -
Scheduling Algorithm For Lot Movement in Semiconductor Wafer Fabrication
by: Norzieyuswati, Md Zenal
Published: (2008)
