Showing 1 - 17 results of 17 for search '"Triple DES"', query time: 0.22s Refine Results
  1. 1
  2. 2

    Perancangan Enkripsi Pada Citra Bitmap Dengan Algoritma Des, Triple Des, dan Idea by Agustinna Yosanny

    Published 2010-12-01
    Subjects: “…image, encryption, DES, triple DES, IDEA…”
    Get full text
    Article
  3. 3

    Algoritma Kriptografi Triple Des dan Steganografi LSB sebagai Metode Gabungan dalam Keamanan Data by Parma Hadi Rantelinggi, Eka Saputra

    Published 2020-08-01
    “…The advantage of the Triple DES algorithm is because this algorithm performs the encryption process three times. …”
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target Defense by Hanqi Tang, Qifu Tyler Sun, Xiaolong Yang, Keping Long

    Published 2018-01-01
    “…Now it has been gradually replaced by the triple DES or advanced encryption standard (AES) so that the encoder has a larger key space. …”
    Get full text
    Article
  7. 7
  8. 8

    Investigating Profiled Side-Channel Attacks Against the DES Key Schedule by Johann Heyszl, Katja Miller, Florian Unterstein, Marc Schink, Alexander Wagner, Horst Gieser, Sven Freud, Tobias Damm, Dominik Klein, Dennis Kügler

    Published 2020-06-01
    “…Finally, we describe a sound approach to estimate actual 3-key triple-DES security levels from empirical single DES results and find that the impact on the security of 3-key triple-DES is limited, i.e. 96.1 bit mean and 0.24 % of key-triples < 80 bit for the same security controller.…”
    Get full text
    Article
  9. 9

    DATA SECURITY IN LOCAL AREA NETWORK BASED ON FAST ENCRYPTION ALGORITHM by G. Ramesh, R. Umarani

    Published 2010-06-01
    “…It operates at high data rate in comparison with The Data Encryption Standard (DES), Triple DES (TDES), Advanced Encryption Standard (AES-256), and RC6 algorithms. …”
    Get full text
    Article
  10. 10

    USAGE OF BIOINFORMATIC DATA FOR REMOTE AUTHENTICATION IN WIRELESS NETWORKS by R Priscilla, M Karthi

    Published 2018-08-01
    “…Experimental results are stated that the proposed method would turnout security virtue and robustness. Triple DES technique is used in the proposed work. This is the technique that is used to encrypt the biometric data into a scrambled format which is difficult to understand by the attackers. …”
    Get full text
    Article
  11. 11

    Encryption in TECB mode: modeling, simulation and synthesis by Ibrahimy, Muhammad Ibn

    Published 2007
    “…This project used single core module to implement encryption in Triple DES Electronic Code Book (TECB) mode, which was modeled using hardware description language VHDL. …”
    Get full text
    Proceeding Paper
  12. 12

    Image encryption algorithm based on chaotic mapping by Salleh, Mazleena, Ibrahim, Subariah, Isnin, Ismail Fauzi

    Published 2003
    “…Unlike other popular encryption algorithms such as Triple-DES and IDEA, SIP manipulates pixels rather than bits. …”
    Get full text
    Article
  13. 13

    Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application by Sadam Hussain, Muhammad Asif, Tariq Shah, Abid Mahboob, Sayed M. Eldin

    Published 2023-01-01
    “…The observed speed of this technique, which uses a key of 256 bits and a block size of 128 bits, is comparable to three-key triple-DES.…”
    Get full text
    Article
  14. 14

    Single core hardware module to implement encryption in TECB mode by Reaz, Mamun Bin Ibne, Ibrahimy, Muhammad Ibn, Mohd-Yasin, Faisal, C., S. Wei, Kamada, Masaru

    Published 2007
    “…This project used single core module to implement encryption in Triple DES Electronic Code Book (TECB) mode, which was modeled using hardware description language VHDL. …”
    Get full text
    Article
  15. 15

    Rotation Left Digits to Enhance the Security Level of Message Blocks Cryptography by Mua'ad Abu-Faraj, Abeer Al-Hyari, Khaled Aldebei, Ziad A. Alqadi, Bilal Al-Ahmad

    Published 2022-01-01
    “…The proposed method will be compared with other standard methods of message cryptography, such as Data Encryption Standard (DES), Triple-DES (3DES), Advanced Encryption Standard (AES), and Blow Fish (BF). …”
    Get full text
    Article
  16. 16

    Enhancement of an Optimized Key for Database Sanitization to Ensure the Security and Privacy of an Autism Dataset by Md. Mokhlesur Rahman, Ravie Chandren Muniyandi, Shahnorbanun Sahran, Suziyani Mohamed

    Published 2021-10-01
    “…Consequently, researchers utilize software or hardware disk encryption, data backup, Data Encryption Standard (DES), TripleDES, Advanced Encryption Standard (AES), Rivest Cipher 4 (RC4), and others. …”
    Get full text
    Article
  17. 17

    РЕАЛІЗАЦІЯ СТАНДАРТУ СИМЕТРИЧНОГО ШИФРУВАННЯ DES МОВОЮ ПРОГРАМУВАННЯ С ТА ПОРІВНЯННЯ ЧАСУ ЙОГО РОБОТИ З ВІДОМИМИ УТИЛІТАМИ... by Liudmyla Hlynchuk, Tetiana Hryshanovych, Andrii Stupin

    Published 2021-12-01
    “…Тому для збільшення криптостійкості було розроблено інші версії цього алгоритму: double DES (2DES), triple DES (3DES), DESX, G-DES. У  перспективі планується розробити на основі запропонованої нами реалізації алгоритму DES утиліти і для демонстрації роботи його модифікацій.…”
    Get full text
    Article