Search Results - asymmetric encryption/decryption algorithm*
-
1
Authors:
Source: Військово-технічний збірник; № 20 (2019); 20-28
Военно-технический сборник; № 20 (2019); 20-28
Military Technical Collection; № 20 (2019); 20-28Subject Terms: асимметричные алгоритмы, шифрование, дешифрование, криптостойкость, RSA, ElGamal, асиметричні алгоритми, шифрування, дешифрування, криптостійкість, asymmetric algorithms, encryption decryption, cryptographic resistance
File Description: application/pdf
-
2
Performance Comparison between RSA and El-Gamal Algorithms for Speech Data Encryption and Decryption
Authors: Sura F. Yousif
Source: Diyala Journal of Engineering Sciences, Vol 16, Iss 1 (2023)
Subject Terms: El-Gamal algorithm, Encryption/Decryption, Mechanics of engineering. Applied mechanics, Environmental engineering, Speech signal, TA213-215, TA349-359, Asymmetric cryptosystem, TA170-171, TK1-9971, Engineering machinery, tools, and implements, Chemical engineering, RSA algorithm, TP155-156, Electrical engineering. Electronics. Nuclear engineering
-
3
Authors: et al.
Source: Mathematics (2227-7390). May2025, Vol. 13 Issue 9, p1366. 17p.
Subject Terms: *EUCLIDEAN algorithm, *SINGLE-board computers, *TELECOMMUNICATION systems, *COMPUTER systems, *ALGORITHMS
-
4
Authors:
Source: Electronics (2079-9292); Oct2025, Vol. 14 Issue 19, p3821, 21p
-
5
Authors: et al.
Source: International Journal of Research in Engineering, Science and Management; Vol. 4 No. 5 (2021); 33-37
Subject Terms: hybrid, Encryption & Decryption time, Asymmetric Key Algorithms, Data security, Symmetric key Algorithms
File Description: application/pdf
-
6
Authors: et al.
Source: Knowledge-Based Systems. Nov2025:Part C, Vol. 330, pN.PAG-N.PAG. 1p.
-
7
Authors:
Source: Cybernetics & Systems Analysis. May2025, Vol. 61 Issue 3, p521-526. 6p.
Subject Terms: *PUBLIC key cryptography, *MODULAR arithmetic, *ARITHMETIC, *MULTIPLICATION, *INTEGRATED circuits
-
8
Enhanced security of affine ciphers using digraph transformation and a modified three pass protocol.
Authors: et al.
Source: Scientific Reports; 10/22/2025, Vol. 15 Issue 1, p1-18, 18p
Subject Terms: DATA encryption, CRYPTOGRAPHY, CIPHERS, SECURITY management, DATA transmission systems
-
9
Authors:
Source: Measuring Equipment and Metrology. 83:5-10
-
10
Alternate Title: AN EFFICIENT ALGORITHM FOR SQUARING MULTI-WORD NUMBERS. (English)
Authors:
Source: Cybernetics & Systems Analysis / Kibernetiki i Sistemnyj Analiz; 2025, Issue 3, p205-212, 8p
Subject Terms: PUBLIC key cryptography, ARITHMETIC, SQUARE, MULTIPLICATION, ALGORITHMS
-
11
Authors: et al.
Source: Frontiers in Energy Research; 2025, p1-14, 14p
Subject Terms: DATA privacy, DATA compression, DATA encryption, ELECTRIC power consumption, COMPRESSED sensing, RSA algorithm
-
12
Authors: et al.
Source: International Journal of Advanced Computer Science & Applications; 2024, Vol. 15 Issue 12, p1-14, 14p
-
13
Authors:
Source: International Journal of Safety & Security Engineering; Jul2025, Vol. 15 Issue 7, p1509-1518, 10p
Subject Terms: DATA security, CRYPTOGRAPHY, RSA algorithm, ADVANCED Encryption Standard
-
14
Authors: Qi, Mingzhi
Source: Journal of Combinatorial Mathematics & Combinatorial Computing; Dec2025, Vol. 127a, p4395-4410, 16p
Subject Terms: INFORMATION technology security, ALGORITHMS, CRYPTOGRAPHY, COMPUTER programming
-
15
Authors: et al.
Source: Journal of Computer Science and Its Application; Vol 26, No 2 (2019); 64-76
Subject Terms: Asymmetric-key, Cryptography, Electronic Medical Records (EMR), Encryption, Decryption, Security, Symmetric-key, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
File Description: application/pdf
-
16
Authors:
Source: Optical & Quantum Electronics; Jan2024, Vol. 56 Issue 1, p1-30, 30p
Subject Terms: GYRATORS, TOPSIS method, ALGORITHMS, CRYPTOCURRENCIES, COMPARATIVE studies, FUZZY sets
-
17
Authors:
Source: Multimedia Tools & Applications; Jul2025, Vol. 84 Issue 23, p26397-26416, 20p
Subject Terms: DATA encryption, DATA security, CIPHERS, FINITE fields, SECURITY management, ELECTROOPTICS
-
18
Authors: K. Savima
Source: International Journal of Intelligent Systems and Applications in Engineering; Vol. 12 No. 3 (2024); 4087-4092
File Description: application/pdf
-
19
Alternate Title: خوارزمية منحنى الإهليلج الهجينة لمينيزيس - فانستون - الجمال. (Arabic)
Authors:
Source: Iraqi Journal of Science; 2025, Vol. 66 Issue 3, p1300-1310, 11p
Subject Terms: ELLIPTIC curve cryptography, ELLIPTIC curves, LOGARITHMS, ALGORITHMS, EMPLOYMENT
-
20
Authors:
Source: Wireless Personal Communications; Jun2024, Vol. 136 Issue 3, p1675-1703, 29p
Nájsť tento článok vo Web of Science
Full Text Finder