A partial image encryption scheme based on DWT and texture segmentation
nowadays, image encryption is an interesting research area due to the rapid growth of communication technologies and the increasing demands for safeguarding the privacy of the transmitted images as unencrypted images are vulnerable to interception ...
Zainab Noori Ghanim +1 more
doaj +1 more source
A Modification on Key Stream Generator for RC4 Algorithm [PDF]
Rivest Cipher 4 (RC4) is one of most common stream cipher, but it experience many problem, such as, there is little combination between the plaintext and cipher-text. For this reason RC4 Cipher is vulnerable to a number of attacks.
Suhad Kareem, Abdul Monem Rahma
doaj +1 more source
Sistem Keamanan Basis Data Klien P.T. Infokes Menggunakan Kriptografi Kombinasi RC4 Dan Base64
PT Infokes Indonesia merupakan sebuah perusahaan yang bergerak dalam pembangunan perangkat lunak yang berfokus pada layanan kesehatan. Saat ini pada PT Infokes transaksi basis data dengan klien dilakukan secara konvensional yaitu dengan mengirimkan basis
Irawan Afrianto, Nurhikmah Taliasih
doaj +1 more source
Roll with the punches: Fibroblast growth factor 10 alleviates pyroptosis of alveolar epithelial cells in different immune niches. [PDF]
Our study reveals a marked decrease of serum FGF10 levels in ARDS patients, correlating with P/F ratio, hospitalisation days and mortality rates. We clarify how FGF10 prevents AECs' pyroptosis triggered by different immune cell infiltrations in different ways.
Wei T +10 more
europepmc +2 more sources
Modelo de acompañamiento pedagógico RC4 en el fortalecimiento del desempeño docente.
El modelo de acompañamiento pedagógico RC4 es un proceso que permite contar con estrategias didácticas y metodológicas innovadoras para fortalecer el desempeño de los docentes.
Ana Isabel Tomalá Andrade +3 more
doaj +1 more source
Implementasi Algoritma RC4 pada Sistem Pengamanan Dokumen Digital Soal Ujian
The development of science and technology has led to changes in the use of documents in life to become digital data. However, this can cause problems, namely regarding data security and confidentiality.
Fauziyah Suwarsita Febriyani +1 more
doaj +1 more source
Improvement of nuclear facilities DNP3 protocol data transmission security using super encryption BRC4 in SCADA systems [PDF]
Background Data transmissions using the DNP3 protocol over the internet in SCADA systems are vulnerable to interruption, interception, fabrication, and modification through man-in-the-middle (MITM) attacks.
Eko Hadiyono Riyadi +2 more
doaj +2 more sources
ANALISA KOMPUTASI ALGORITMA DES DENGAN RC4 UNTUK KEAMANAN DATA
Keamanan dan kerahasiaan data merupakan salah satu aspek terpenting dalam bidang komunikasi khususnya komunikasi yang menggunakan media komputer. Salah satu bidang ilmu pengetahuan yang digunakan untuk mengamankan data adalah kriptografi, kecepatan ...
Busran, Jeri Widodo Putra
doaj +1 more source
Tabu Search Against Permutation Based Stream Ciphers [PDF]
Encryption is one of the most effective methods of securing data confidentiality, whether stored on hard drives or transferred (e.g. by e-mail or phone call). In this paper a new state recovery attack with tabu search is introduced. Based on research and
Iwona Polak, Marcin Boryczka
doaj +1 more source
MV3: A new word based stream cipher using rapid mixing and revolving buffers [PDF]
MV3 is a new word based stream cipher for encrypting long streams of data. A direct adaptation of a byte based cipher such as RC4 into a 32- or 64-bit word version will obviously need vast amounts of memory. This scaling issue necessitates a look for new
A. Biryukov +14 more
core +3 more sources

