Search Results - "decryption-algorithm"
-
1
Authors: Zhour, Oumazouz
Source: International Journal of Mathematics and Computer Science. :465-468
Subject Terms: decryption algorithm, cryptographic systems, sequence of local complementations, Cryptography, Algebraic coding theory, cryptography (number-theoretic aspects), Paley graphs, encryption algorithm, quadratic residues
File Description: application/xml
-
2
Authors:
Source: International journal of electrical and computer engineering systems
Volume 14
Issue 1Subject Terms: decryption algorithm, DNA encoding, optimization algorithm, Image encryption, Logical operations, image compression, chaotic maps
File Description: application/pdf
-
3
Authors:
Source: Acta et Commentationes: Ştiinţe Exacte şi ale Naturii, Vol 14, Iss 2 (2023)
Acta et commentationes (Ştiinţe Exacte și ale Naturii) 14 (2) 117-131Subject Terms: grupoid latin, Science, Latin groupoid, algoritm de criptare și decriptare, izotopi, isotopes, encryption and decryption algorithm
File Description: application/pdf
-
4
Authors:
Source: Ratio Mathematica, Vol 46, Iss 0 (2023)
-
5
Authors: et al.
Source: Singh Rathore, M, Poongodi , M, Saurabh, P, Lilhore, U K, Bourouis, S, Alhakami, W, Osamor, J & Hamdi, M 2022, 'A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography', Computers and Electrical Engineering, vol. 102, 108205. https://doi.org/10.1016/j.compeleceng.2022.108205
Subject Terms: Internet of Vehicles, data security, steganography, DES algorithm, encryption decryption algorithm, LSB method, /dk/atira/pure/sustainabledevelopmentgoals/industry_innovation_and_infrastructure, name=SDG 9 - Industry, Innovation, and Infrastructure, /dk/atira/pure/subjectarea/asjc/2200/2208, name=Electrical and Electronic Engineering, /dk/atira/pure/subjectarea/asjc/2200/2207, name=Control and Systems Engineering, /dk/atira/pure/subjectarea/asjc/1700/1700, name=General Computer Science
File Description: application/pdf
Relation: info:eu-repo/semantics/altIdentifier/pissn/0045-7906; info:eu-repo/semantics/altIdentifier/eissn/1879-0755
Availability: https://researchonline.gcu.ac.uk/en/publications/45b60e42-ee0a-46a9-8526-fedc9e6c5e46
https://doi.org/10.1016/j.compeleceng.2022.108205
https://researchonline.gcu.ac.uk/ws/files/55717921/Rathore_M.S._et_al_2022_A_novel_trust_based_security_privacy_model_for_Internet_of_Vehicles_using_encryption_and_stenography.pdf
https://doi.org/10.1016/j.compeleceng.2022.108387
https://www.scopus.com/pages/publications/85133771697 -
6
Authors: et al.
Subject Terms: RSA Algorithm, Remodeled RSA algorithm, Encryption decryption algorithm, Gaussian primes, Cryptography
Relation: https://zenodo.org/records/5938334; oai:zenodo.org:5938334; https://doi.org/10.47191/ijmcr/v10i2.01
-
7
Authors:
Subject Terms: Encryption algorithm word- base, Encryption/decryption algorithm, English text encoding, Two-dimensional shuffling operations
Relation: https://zenodo.org/records/5773628; oai:zenodo.org:5773628
-
8
Source: Jisuanji gongcheng, Vol 47, Iss 12, Pp 147-155,162 (2021)
Subject Terms: opencl framework, field programmable gate array(fpga), encryption and decryption algorithm, 3des algorithm, pipeline parallel structure, Computer engineering. Computer hardware, TK7885-7895, Computer software, QA76.75-76.765
File Description: electronic resource
-
9
Authors: Kumar, Ashutosh
Source: International Journal of Scientific Research in Computer Science and Engineering; Vol. 8 No. 1 (2020): February ; 120-122 ; 2320-7639
Subject Terms: Cloud Computing, DD-PLAC, encryption, data privacy, decryption algorithm
File Description: application/pdf
Relation: https://ijsrcse.isroset.org/index.php/j/article/view/349/349; https://ijsrcse.isroset.org/index.php/j/article/view/349
Availability: https://ijsrcse.isroset.org/index.php/j/article/view/349
-
10
Authors:
Subject Terms: Biometric template, template-database, multiFernet, encryption-algorithm, decryption-algorithm, Twilio SMS
Availability: https://doi.org/10.14569/IJACSA.2019.0101051
-
11
Authors:
Subject Terms: Biometric template, Template-database, Encryption-algorithm, Decryption-algorithm, Twilio SMS
File Description: application/pdf
-
12
Authors: et al.
Subject Terms: Underwater acoustic sensor networks(UASNs), Polling for data collection, online prediction, Clustering interaction, BER: Bit Error Ratio, AUV: Autonomous Underwater Vehicle, RCAP: Reliable Collection based on AUV with Prediction, Military surveillance, Acoustic sensor network, AUV polls structures, Vertical polling, Horizontal polling, Energy consumption, Horizontal architecture, Gateway members, Decryption algorithm
File Description: application/pdf
Availability: http://medcraveonline.com/IRATJ/IRATJ-02-00030.pdf
-
13
Authors: et al.
Source: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2019, E102.A(9):1028
-
14
Authors:
Source: International Journal of Sciences: Basic and Applied Research (IJSBAR); Vol. 25 No. 3 (2016); 142-153 ; 2307-4531
Subject Terms: Encryption images, Mathematics Module, Encryption algorithms, Encryption Decryption algorithm, Encryption Exchange blocks
File Description: application/pdf
-
15
-
16
Authors:
Subject Terms: Copyright Protection, Stage staffing watermarking, Digital Multimedia, Encryption and Decryption algorithm for watermarking, Logistic Map, 2-D Arnold Cat Map, Stage Staffing
Relation: https://zenodo.org/records/1420199; oai:zenodo.org:1420199; https://doi.org/10.5121/ijnsa.2011.3211
-
17
Authors: Urvoy De Portzamparc, Frédéric
Thesis Advisors: Paris 6, Faugère, Jean-Charles
Subject Terms: Cryptographie à clé publique, Cryptanalyse algébrique, Cryptosystème de McEliece, Codes de Goppa, Codes alternants, Cryptographie post-quantique, Code-based cryptography, Decryption algorithm of McEliece, 005.8
Availability: http://www.theses.fr/2015PA066106/document
-
18
Authors: et al.
Contributors: et al.
Source: https://theses.hal.science/tel-01187916 ; Other [cs.OH]. Université Pierre et Marie Curie - Paris VI, 2015. English. ⟨NNT : 2015PA066106⟩.
Subject Terms: Code-based cryptography, Decryption algorithm of McEliece, Cryptographie à clé publique, Cryptanalyse algébrique, Cryptosystème de McEliece, Codes de Goppa, Codes alternants, Cryptographie post-quantique, [INFO.INFO-OH]Computer Science [cs]/Other [cs.OH]
Relation: NNT: 2015PA066106
-
19
Authors:
Contributors:
Subject Terms: Cryptographie à clé publique, Cryptanalyse algébrique, Cryptosystème de McEliece, Codes de Goppa, Codes alternants, Cryptographie post-quantique, Code-based cryptography, Decryption algorithm of McEliece, 005.8
Availability: http://www.theses.fr/2015PA066106/document
-
20
Authors:
Subject Terms: криптографічні системи на ідентифікаторах, алгебраїчні решітки, прообраз вибірки, ідентифікатор користувача, identity-based encryption systems, encryption algorithm, decryption algorithm, trapdoor function
File Description: application/pdf
Availability: http://openarchive.nure.ua/handle/document/113
Nájsť tento článok vo Web of Science
Full Text Finder