[PDF][PDF] Cryptanalysis of polyalphabetic cipher using differential evolution algorithm

AKS Sabonchi, B Akay - Tehnički vjesnik, 2020 - hrcak.srce.hr
Cryptanalysis of Polyalphabetic Cipher Using Differential Evolution Algorithm Page 1 Tehnički
vjesnik 27, 4(2020), 1101-1107 1101 ISSN 1330-3651 (Print), ISSN 1848-6339 (Online) …

Securing medical IoT devices using Diffie-Hellman and DES cryptographic schemes

K Quist-Aphetsi, MC Xenya - … on Cyber Security and Internet of …, 2019 - ieeexplore.ieee.org
IoT cuts across almost any field where communication or monitoring is needed. Recent
works in IoT focuse on the architecture, secured communication, topologies, platforms etc. In …

A robust indoor localization method for NLOS environments utilizing sensor subsets

K Ishida, E Okamoto, HB Li - IEEE Open Journal of Signal …, 2022 - ieeexplore.ieee.org
Indoor location localization using the time of arrival (TOA) of ultra-wideband (UWB) radio
waves faces a challenge in obtaining accurate TOA values in a non-line-of-sight (NLOS) …

A Survey of Lightweight Cryptosystems for Smart Home Devices

OM Olaniyi, AA Alfa, IA Dauda… - Covenant …, 2023 - journals.covenantuniversity.edu.ng
A Smart Home uses interconnected network technology to monitor the environment, control
the various physical appliances, and communicate with each other in a close environment. A …

Enkripsi dan dekripsi pesan menggunakan polinomial Galois Field dengan algoritma Hill Cipher

A Vega - 2022 - etheses.uin-malang.ac.id
Dalam proses penyusunan skripsi ini, penulis banyak menerima bimbingan, masukan, dan
arahan dari berbagai pihak. Oleh karena itu melalui halaman ini penulis ingin …

New Post-quantum Crypto-algorithm Utilizing Hash Function: Applicable in Blockchain

N Tiwari, S Dwivedi, S Singh - International Conference On Innovative …, 2024 - Springer
Hash-based cryptosystem is most active research area in cryptography. Hash-based
cryptosystem provides more security and authenticity because hash functions are …

[PDF][PDF] GPH

MNJO Ozioma - International Journal of Mathematics, 2023 - researchgate.net
ABSTRACT RSA encryption is a widely employed cryptographic is the branch of pure
mathematics that studies posit theory seeks to discover relationships existing be decryption …

Performance Limits of QR Code Technology for Air-Gapped Military Communication

A Thoresson - 2024 - diva-portal.org
In this thesis, an investigation into the feasibility and performance limits of QR code
technology to enable secure air-gapped military communication was performed. Conducted …

[PDF][PDF] A Comparative Survey of Symmetric and Asymmetric Key Cryptography Algorithms

UH Shaikh, MM Abbas, SA Lahad, M Razi, M Shaikh - researchgate.net
In today's digital world it is crucial to ensure that sensitive information is securely transmitted
and stored. Cryptography, which involves encoding and decoding data plays a role, in …

Security Strategies and Blockchain Functionalities for Genomics Analytics in Bioinformatics

A Mohammed Yakubu - 2021 - opal.latrobe.edu.au
A thesis submitted in total fulfilment of the requirements for the degree of Doctor of
Philosophy to the Department of Computer Science and Information Technology, School of …