-
1
-
2by Taha Alshaikhli, Imad Fakhri, Al-Dabbagh, Sufyan Salim Mahmood, Zaba, Muhammad Reza“… these problems solved in three directions. The first direction proposed lightweight block cipher algorithm called…”
Published 2017
Get full text
Get full text
-
3“…Block ciphers provide confidentiality by encrypting confidential messages into unintelligible form…”
Get full text
Get full text
Get full text
Get full text
-
4“…Although the AES is an excellent and preferred choice for almost all block cipher applications…”
Get full text
Get full text
Get full text
-
5“… (Sboxes) for use in lightweight block ciphers. An S-box is commonly used in block ciphers to provide…”
Get full text
Get full text
Get full text
Get full text
-
6“…Lightweight block cipher algorithms are very important for constraint environment. This paper…”
Get full text
Get full text
Get full text
-
7“…Lightweight block cipher algorithms are vital for constrained environment. It is easy to propose…”
Get full text
Get full text
Get full text
-
8“…Lightweight block cipher algorithms are vital for constrained environment. There are many…”
Get full text
Get full text
Get full text
Get full text
-
9by Khaleel, Ghassan, Turaev, Sherzod, Mohd Tamrin, Mohd Izzuddin, Alshaikhli, Imad Fakhri Taha“… to use block ciphers are become very important. This paper presents a new block cipher based on finite…”
Published 2016
Get full text
Get full text
Get full text
-
10by Al-Dabbagh, Sufyan Salim Mahmood, Sulaiman, Alyaa Ghanim, Alshaikhli, Imad Fakhri Taha, Al-Enezi, Khalid Abdulkareem, Alenezi, Abdulrahman Yousef“… block cipher algorithm is suitable for these environments. This paper improved DLBCA algorithm…”
Published 2018
Get full text
Get full text
Get full text
Get full text
Get full text
-
11“… on TS Block and Stream Ciphers, and is capable of protecting data at the data element, row, and column…”
Get full text
Get full text
Get full text
-
12by AlDabbagh, Sufyan Salim Mahmood, Alshaikhli, Imad Fakhri Taha, Al-Enezi, Khalid Abdulkareem, Alyaqoup, Mohammed Jasem“…Lightweight block cipher algorithms are vital for constrained environment. There are three factors…”
Published 2015
Get full text
Get full text
Get full text
Get full text
Get full text
-
13by Al-Dabbagh, Sufyan Salim Mahmood, Alshaikhli, Imad Fakhri Taha, Al-Enezi, Khalid Abdulkareem, Alyaqoup, Mohammed Jasem“…Lightweight block cipher algorithms are vital for constrained environment. There are three factors…”
Published 2016
Get full text
Get full text
Get full text
Get full text
Get full text
-
14by Shamsudin, Ahmad Faizul, Suhaimi, Mohd Adam, Makarin, Rusydi Hasan, Jaafar, Abi Dzar“… and completed in 2006. The Al-Muqattaat UCE was patent filed in 2007. A block cipher is required as a medium…”
Published 2010
Get full text
Get full text
-
15“… the template could be modified by attacker. Hill Cipher is a block cipher and symmetric key algorithm it has…”
Get full text
Get full text
Get full text
-
16by Shamsudin, Ahmad Faizul, Ibrahim, Jamaludin, Sembok, Tengku Mohd, Noordin, Mohamad Fauzan, Hashim, Jamil, Wan Yusof, Wan Sabri“… for substitution block-cipher boxes. The objects based on extracted Al-Qur’an and Al-Hadith symbols by use of ethno…”
Published 2013
Get full text
Get full text
Get full text
Get full text
-
17“…Lightweight block cipher algorithms are vital for constrained environment. Substitution box (S-box…”
Get full text
Get full text
Get full text
Get full text
-
18“… primitives, lightweight block cipher plays a major role to secure RFID’s tag. One of the common lightweight…”
Get full text
Get full text
Get full text
-
19by Nor Robaini, Ibrahim“…), is an approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a block…”
Published 2008
Get full text
Get full text
-
20by Alkandari, Abdulaziz M, Alkandari, Khalil Ibrahim, Taha, Imad, Alahmad, Mohammad A.“… called Gear in this paper. It is a hash function based on block cipher in Davies-Meyer mode. It uses…”
Published 2015
Get full text
Get full text
Get full text