[PDF][PDF] Affine cipher cryptanalysis using genetic algorithms
YS Mezaal, SF Abdulkareem - JP Journal of Algebra, Number Theory …, 2017 - academia.edu
Genetic algorithms (GAs) have been used as a powerful tool for cryptanalyzing affine
ciphers in this paper for the first time. They are one of heuristic search techniques which use …
ciphers in this paper for the first time. They are one of heuristic search techniques which use …
[PDF][PDF] Image Encryption Based on Multi-Level Keys on RC5 Algorithm.
In recent years, the need to develop encryption algorithms has led to an increase in the
working and efficiency of algorithms to protect the transmission and reception of information …
working and efficiency of algorithms to protect the transmission and reception of information …
Employing topology optimization method to create optimum telecommunication tower design structure
AY Sahib, A Assad, OM Mohammed… - Sustainable …, 2024 - sei.ardascience.com
Recently, the employment of topology optimization (TO) in structural engineering design has
gained a significant structural performance, also, TO is employed by designers for …
gained a significant structural performance, also, TO is employed by designers for …
[PDF][PDF] A performance comparison of encryption/decryption algorithms for UAV swarm communications
TT Khoei, E Ghribi, P Ranganathan… - Academic Press, 2021 - researchgate.net
Encryption algorithms play an essential role in network security. They are one type of
countermeasure that can prevent unauthorized access of data. Although the security …
countermeasure that can prevent unauthorized access of data. Although the security …
[كتاب][B] Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean Approach
B Zolfaghari, K Bibak - 2022 - books.google.com
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-
secure cryptosystem guarantees that the malicious third party cannot guess anything …
secure cryptosystem guarantees that the malicious third party cannot guess anything …
Security analysis of improved one-time pad cryptography using TRNG key generator
EMM Manucom, BD Gerardo… - 2019 IEEE 5th …, 2019 - ieeexplore.ieee.org
Cryptography is one of the important aspect of data and information security. The security
strength of cryptographic algorithms rely on the secrecy and randomness of keys. In this …
strength of cryptographic algorithms rely on the secrecy and randomness of keys. In this …
New Key Generation and Encryption Algorithms for Privacy Preservation in Mobile Ad Hoc Networks
Abstract Mobile Ad Hoc Networks (MANETs) get widespread applications along with the
evolving technologies. However, MANETs are at risk due to the shortage of security …
evolving technologies. However, MANETs are at risk due to the shortage of security …
Information-theoretic cryptography and perfect secrecy
B Zolfaghari, K Bibak - Perfect Secrecy in IoT: A Hybrid Combinatorial …, 2022 - Springer
In this chapter, we first introduce entropy and some basic concepts related to information
theory. We show how entropy has find its way from thermodynamics into information theory …
theory. We show how entropy has find its way from thermodynamics into information theory …
Algoritma Split-Merge One Time Pad Dalam Peningkatan Enkripsi Data
P Utomo, S Sapriadi, M Zarlis - … (Seminar Nasional Teknik …, 2017 - semantika.polgan.ac.id
Abstract One Time Pad (OTP) merupakan salah satu algoritma kriptografi yang sangat sulit
untuk dipecahkan kriptanalis. Namun seiring perkembangan teknologi, semakin banyak …
untuk dipecahkan kriptanalis. Namun seiring perkembangan teknologi, semakin banyak …
[PDF][PDF] GRAPHIC DIGITAL TECHNIQUES IN THE FINE ARTS DESIGN AND PROCESSING.
A DARRAJI, K FAKHIR - Journal of Theoretical & Applied Information …, 2018 - jatit.org
Computerized graphics processing techniques cannot just resolve the difficulty of customary
painting simulation in the art, but have more gains in the teaching of art features and task to …
painting simulation in the art, but have more gains in the teaching of art features and task to …