Results 11 to 20 of about 1,954 (70)
Using of tiny encryption algorithm in CAN-Bus communication
The rising costs of agriculture machine operation force manufacturers to look for solutions that simplify the machine operation to its users and increase user comfort.
M. Jukl, J. ÄŒupera
doaj +1 more source
Color Image Encryption Using Hybrid Method of Fractal-Based Key and Private XOR Key [PDF]
The main idea of image encryption is to ensure secure transmitting it in the open network by transforming the image to not understandable form so that unauthorized person cannot decrypt and see it.
Faten H. MohammedSediq+2 more
doaj +1 more source
Proposal to Complex DES Security Using Diffie Hellman Injection [PDF]
Data Encryption Standard (DES) is based on a round of starters, from the results of the use of multi-stage permutation and replacement to the more complex algorithm which adopts the symmetric key.
Shatha habeeb Jafar
doaj +1 more source
Kriptografi adalah ilmu yang mempelajari teknik-teknik matematika yang berhubungan dengan aspek keamanan informasi. Metode kriptografi yang digunakan untuk mengamankan pesan diantaranya adalah affine cipher dan cipher transposisi grup simetri.
Ilfi Nur Diana
doaj +1 more source
The Rivest Cipher 4 (RC4) has been one of the most popular stream ciphers for providing symmetric key encryption, and is now proposed as an efficient cipher within light-weight cryptography. As an algorithm it has been considered to be one of the fastest
Rahul Saha+4 more
doaj +1 more source
The new normal? Redaction bias in biomedical science
A concerning amount of biomedical research is not reproducible. Unreliable results impede empirical progress in medical science, ultimately putting patients at risk.
David Robert Grimes, James Heathers
doaj +1 more source
Fast software encryption system based on local pseudorandomness [PDF]
New software-oriented single key cryptosystem based on local pseudorandomness is considered. Its cryptorobustness is characterized in probabilistic terms.
A. Moldovyan , N. Moldovyan
doaj
PERBANDINGAN PLAYFAIR CIPHER DENGAN 3D PLAYFAIR CIPHER PADA PENGAMANAN CITRA
The development of sending messages that are increasingly easy and sophisticated makes it easier for third parties to access or sabotage the contents of the message, so we need a science called cryptography to secure the message.
Rika Ayu Sukmawati+2 more
doaj +1 more source
De novo variants of IRF2BPL result in developmental epileptic disorder
Background Pathogenic variants of the IRF2BPL gene have been reported to cause neurodevelopmental disorders; however, studies focused on IRF2BPL in zebrafish are limited.
Yong Wang+8 more
doaj +1 more source
LSB STEGANO PADA KOMBINASI KRITPOGRAFI SIMETRIS CAESAR-VIGENERE
Dalam perkembangan teknologi komunikasi data, dan banyaknya problem mengenai manipulasi data maka perlu tindak lanjut mengenai teknik untuk mengamankan data.
Ibnu Utomo Wahyu Mulyono+2 more
doaj +1 more source