Showing 21 - 32 results of 32 for search '"Twofish"', query time: 0.08s Refine Results
  1. 21

    Enhancing performance of XTS cryptography mode of operation using parallel design by Ahmed Alomari, Mohammad

    Published 2009
    “…In addition, the parallel XTS mode was also simulated using Twofish and RC6 encryption algorithms. Detailed comparison between Twofish and RC6 algorithms has been made with respect to AES algorithm.…”
    Get full text
    Thesis
  2. 22

    Proposition of a Better Data Security Model for a Protective Information Exchange on the Internet with Advanced Steganographic and Cryptographic Algorithm by Y. Y. Abdullahi, L. G. Farouk, A. S. Nur, A. Sale

    Published 2024-10-01
    “…Three cryptographic symmetric key encryption algorithm (RC6, Rijndael and TwoFish) and four steganographic carrier object (Image, audio, text and video) were considered. …”
    Get full text
    Article
  3. 23
  4. 24

    Image Encryption Algorithms: A Survey of Design and Evaluation Metrics by Yousef Alghamdi, Arslan Munir

    Published 2024-02-01
    “…Since widely used and secure encryption methods, such as AES, Twofish, and RSA, are not suitable for real-time image encryption due to their slow encryption speeds and high computational requirements, researchers have proposed specialized algorithms for image encryption. …”
    Get full text
    Article
  5. 25

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Conference or Workshop Item
  6. 26

    BLOCK CIPHER PERFORMANCE AND RISK ANALYSIS by amina Alregabo, Yassin Hikmat Ismael

    Published 2023-06-01
    “… The 8 block ciphers are: DES, 3DES, Blowfish, Twofish, PRISENT, KLEIN, IDEA and AES. All of them are symmetric block ciphers with different designs. …”
    Get full text
    Article
  7. 27

    Cryptographically Secure PseudoRandom Bit Generator for Wearable Technology by Michał Melosik, Mariusz Galan, Mariusz Naumowicz, Piotr Tylczyński, Scott Koziol

    Published 2023-06-01
    “…Hardware implementations were made for several selected Block Cryptographic algorithms such as Advanced Encryption Standard (AES), Twofish and 3DES. The random binary values generated by the wearable CSPRBG were analyzed by National Institute of Standards and Technology (NIST) statistical tests as well as ENT tests to evaluate their randomness, depending on the configuration of the entropy sources used. …”
    Get full text
    Article
  8. 28

    Improved SERPENT Algorithm: Design to RGB Image Encryption Implementation by Tariq Shah, Tanveer ul Haq, Ghazanfar Farooq

    Published 2020-01-01
    “…In facet of data security, the algorithms specifically Rijndael (Advanced Encryption Standard-AES), SERPENT and TWOFISH are equally considered to be the best. However, they pay less attention in some cryptographic areas like digital image encryption schemes because of their time consumption inferiority. …”
    Get full text
    Article
  9. 29

    Enhancing Cloud Security: A Multi-Factor Authentication and Adaptive Cryptography Approach Using Machine Learning Techniques by K. Sasikumar, Sivakumar Nagarajan

    Published 2025-01-01
    “…It uses a dual-encryption strategy that combines five algorithm pairs: AES + HMAC (SHA-256), ECC + HMAC (SHA-512), HMAC-MD5 + PBKDF2, Twofish + Argon2, and Blowfish + HMAC SHA3-256. A Hybrid CNN-transformer model predicts and classifies attacks by dynamically adjusting an encryption algorithm to secure the data. …”
    Get full text
    Article
  10. 30

    A New Hybrid Automated Security Framework to Cloud Storage System by Noha E. El-Attar, Doaa S. El-Morshedy, Wael A. Awad

    Published 2021-12-01
    “…Furthermore, the algorithms RSA and Twofish are used to encrypt the generated keys to enhance privacy issues. …”
    Get full text
    Article
  11. 31
  12. 32

    An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices by Alomari, Mohammad Ahmed Mohammad

    Published 2017
    “…Other storage encryption algorithms, i.e. XTS-Twofish and XTS-RC6, have also been implemented in both serial and parallel designs and then evaluated. …”
    Get full text
    Thesis