The tiny encryption algorithm

SJ Shepherd - Cryptologia, 2007 - Taylor & Francis
Abstract The Tiny Encryption Algorithm (TEA) has been around for just over ten years. It is
probably the most “minimal”—and hence fastest—block cipher ever devised and yet …

[PDF][PDF] A modification of TEA block cipher algorithm for data security (MTEA)

GS Mahdi - Journal, Vol, 2011 - iasj.net
This paper attempts to develop a simple, stronger and safer cryptographic algorithm which
would not only be a secure one, but also reduces total time taken for encryption and …

[PDF][PDF] Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform.

AT Hashim, SA Ali - International Journal of Electrical & Computer …, 2018 - core.ac.uk
Multiple Secret Image Sharing scheme is a protected approach to transmit more than one
secret image over a communication channel. Conventionally, only single secret image is …

Pragmatic security for constrained wireless networks

PG Bradford, BM Grizzell, GT Jay… - Security in Distributed …, 2007 - taylorfrancis.com
This chapter gives a select survey of security issues for constrained wireless networks. This
chapter starts with security in the design of constrained devices; it goes on through security …

[PDF][PDF] Cryptanalysis of some block ciphers.

AGH Naim - 2016 - core.ac.uk
CRYPTANALYSIS OF SOME BLOCK CIPHERS Abdul Ghani Haji Naim Royal Holloway,
University of London Page 1 CRYPTANALYSIS OF SOME BLOCK CIPHERS Submitted by …

於 Auto-ID 的環境中使用加密傳輸

陳俊麟 - 2003 - ir.lib.nycu.edu.tw
本論文主要是針對原有Auto-ID 的架構中, 因使用明碼傳輸所造成的安全議題加以討論並改良,
其方法為使用一對稱式加解密演算法-TEA 來保護傳輸的EPC, 並針對此加密電路的實行性作了 …

[CITATION][C] تقوية لخوارزمية التشفير الصغيرة جداً

ساري حاج حسين - Tishreen University Journal-Engineering Sciences …, 2009