-
21
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…In addition, the parallel XTS mode was also simulated using Twofish and RC6 encryption algorithms. Detailed comparison between Twofish and RC6 algorithms has been made with respect to AES algorithm.…”
Get full text
Thesis -
22
Proposition of a Better Data Security Model for a Protective Information Exchange on the Internet with Advanced Steganographic and Cryptographic Algorithm
Published 2024-10-01“…Three cryptographic symmetric key encryption algorithm (RC6, Rijndael and TwoFish) and four steganographic carrier object (Image, audio, text and video) were considered. …”
Get full text
Article -
23
-
24
Image Encryption Algorithms: A Survey of Design and Evaluation Metrics
Published 2024-02-01“…Since widely used and secure encryption methods, such as AES, Twofish, and RSA, are not suitable for real-time image encryption due to their slow encryption speeds and high computational requirements, researchers have proposed specialized algorithms for image encryption. …”
Get full text
Article -
25
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Conference or Workshop Item -
26
BLOCK CIPHER PERFORMANCE AND RISK ANALYSIS
Published 2023-06-01“… The 8 block ciphers are: DES, 3DES, Blowfish, Twofish, PRISENT, KLEIN, IDEA and AES. All of them are symmetric block ciphers with different designs. …”
Get full text
Article -
27
Cryptographically Secure PseudoRandom Bit Generator for Wearable Technology
Published 2023-06-01“…Hardware implementations were made for several selected Block Cryptographic algorithms such as Advanced Encryption Standard (AES), Twofish and 3DES. The random binary values generated by the wearable CSPRBG were analyzed by National Institute of Standards and Technology (NIST) statistical tests as well as ENT tests to evaluate their randomness, depending on the configuration of the entropy sources used. …”
Get full text
Article -
28
Improved SERPENT Algorithm: Design to RGB Image Encryption Implementation
Published 2020-01-01“…In facet of data security, the algorithms specifically Rijndael (Advanced Encryption Standard-AES), SERPENT and TWOFISH are equally considered to be the best. However, they pay less attention in some cryptographic areas like digital image encryption schemes because of their time consumption inferiority. …”
Get full text
Article -
29
Enhancing Cloud Security: A Multi-Factor Authentication and Adaptive Cryptography Approach Using Machine Learning Techniques
Published 2025-01-01“…It uses a dual-encryption strategy that combines five algorithm pairs: AES + HMAC (SHA-256), ECC + HMAC (SHA-512), HMAC-MD5 + PBKDF2, Twofish + Argon2, and Blowfish + HMAC SHA3-256. A Hybrid CNN-transformer model predicts and classifies attacks by dynamically adjusting an encryption algorithm to secure the data. …”
Get full text
Article -
30
A New Hybrid Automated Security Framework to Cloud Storage System
Published 2021-12-01“…Furthermore, the algorithms RSA and Twofish are used to encrypt the generated keys to enhance privacy issues. …”
Get full text
Article -
31
Multi-shape symmetric encryption mechanism for nongeneric attacks mitigation
Published 2023Get full text
Thesis -
32
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
Published 2017“…Other storage encryption algorithms, i.e. XTS-Twofish and XTS-RC6, have also been implemented in both serial and parallel designs and then evaluated. …”
Get full text
Thesis