Results 21 to 30 of about 77,534 (185)
Authentication of data hiding using co-occurrence matrix [PDF]
This research is considered one of the steps aiming to deal with one of the most important challenges facing communicators via Internet, as a means for ensuring information security and verifying the authenticity and credibility of the received message ...
Melad saeed, Ghada thanoon
doaj +1 more source
The Importance of Creativity in the Sportification of Breakdance
Many historical works have attempted to reveal the process of the sportification of physical activity that originated in the eighteenth century. The process of sportification can be divided into three basic mechanisms: The institutionalization of ...
Zhi Yang, YuJie Bai, MingTao Wei
doaj +1 more source
A New Type of Cipher: DICING_csb [PDF]
In this paper, we will propose a new type of cipher named DICING_csb, which is derived from our previous stream cipher DICING. It has applied a stream of subkey and an encryption form of block ciphers, so it may be viewed as a combinative of stream ...
Li, An-Ping
core +2 more sources
De novo variants of IRF2BPL result in developmental epileptic disorder
Background Pathogenic variants of the IRF2BPL gene have been reported to cause neurodevelopmental disorders; however, studies focused on IRF2BPL in zebrafish are limited.
Yong Wang +8 more
doaj +1 more source
Another prime mover in the development of computers was cryptography – and in particular the breaking of German military codes during the second world war. It was this activity which really led to the modern computer era.
openaire +2 more sources
A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices
The Internet of Things (IoT) paradigm envisions a world where everyday things interchange information between each other in a way that allows users to make smarter decisions in a given context.
Evangelina Lara +3 more
doaj +1 more source
Kriptografi adalah ilmu yang mempelajari teknik-teknik matematika yang berhubungan dengan aspek keamanan informasi. Metode kriptografi yang digunakan untuk mengamankan pesan diantaranya adalah affine cipher dan cipher transposisi grup simetri.
Ilfi Nur Diana
doaj +1 more source
FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher
Security of sensitive data exchanged between devices is essential. Low-resource devices (LRDs), designed for constrained environments, are increasingly becoming ubiquitous.
Sa’ed Abed +3 more
doaj +1 more source
Color Image Encryption Using Hybrid Method of Fractal-Based Key and Private XOR Key [PDF]
The main idea of image encryption is to ensure secure transmitting it in the open network by transforming the image to not understandable form so that unauthorized person cannot decrypt and see it.
Faten H. MohammedSediq +2 more
doaj +1 more source
PERBANDINGAN PLAYFAIR CIPHER DENGAN 3D PLAYFAIR CIPHER PADA PENGAMANAN CITRA
The development of sending messages that are increasingly easy and sophisticated makes it easier for third parties to access or sabotage the contents of the message, so we need a science called cryptography to secure the message.
Rika Ayu Sukmawati +2 more
doaj +1 more source

