Výsledky vyhledávání - Symmetric decryption algorithm

Upřesnit hledání
  1. 1

    Local thinning of 3D stereo images based on symmetric decryption algorithm Autor Wu, Chenglin, Li, Zhaoyang

    ISSN: 0141-9331, 1872-9436
    Vydáno: Kidlington Elsevier B.V 01.04.2021
    Vydáno v Microprocessors and microsystems (01.04.2021)
    “… Based on the symmetric decryption algorithm, this method acquires the symmetric information of 3-D stereo image, filters out the pseudo-feature points, extracts the local detail features of 3-D…”
    Získat plný text
    Journal Article
  2. 2

    Energy Optimization on Symmetric Key Encryption and Decryption Algorithm using Genetic Algorithm Autor Mishra, Ratnesh, Shukla, Ravi Shanker, Shukla, Rajesh K., Tewari, R.R.

    ISSN: 2278-3075, 2278-3075
    Vydáno: 30.08.2019
    “…In this paper we have proposed energy optimization on symmetric key encryption and decryption algorithm are using genetic algorithm where we have used symmetric key for encryption…”
    Získat plný text
    Journal Article
  3. 3
  4. 4

    Numerical algorithms for corner-modified symmetric Toeplitz linear system with applications to image encryption and decryption Autor Zhang, Xing, Zheng, Yanpeng, Jiang, Zhaolin, Byun, Heejung

    ISSN: 1598-5865, 1865-2085
    Vydáno: Berlin/Heidelberg Springer Berlin Heidelberg 01.04.2023
    “… Based on the decomposition of Toeplitz inversion and order-reduction algorithm, two new algorithms for the product of symmetric Toplitz inversion and the vector are proposed…”
    Získat plný text
    Journal Article
  5. 5

    Improvement security in e-business systems using hybrid algorithm Autor Sumaryanti, L., Kusuma, Dedy Hidayat, Widijastuti, Rosmala, Muzaki, Muhammad Najibulloh

    ISSN: 1693-6930, 2302-9293
    Vydáno: Yogyakarta Ahmad Dahlan University 01.10.2021
    Vydáno v Telkomnika (01.10.2021)
    “… Encryption and decryption of messages or information carried by a symmetric key using the simple symmetric key algorithm and asymmetric keys using the Rivest Shamir Adleman (RSA) algorithm…”
    Získat plný text
    Journal Article
  6. 6

    A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets Autor Ahmad, Sahan, Alam, Kazi Md Rokibul, Rahman, Habibur, Tamura, Shinsuke

    Vydáno: IEEE 01.01.2015
    “…This paper presents a comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets through simulation…”
    Získat plný text
    Konferenční příspěvek
  7. 7

    Efficient implementation of 1024-bit symmetric encryption and decryption algorithm for real time communication systems Autor Ishfaq, Abubakar, Naqash, Talha, Hasan, M. Amish, Mukhtar, Amir, Ashraf Ch, M.Ali, Mujahid, Umar, Najam-ul-Islam, M.

    ISBN: 9781467351584, 146735158X
    Vydáno: IEEE 01.12.2012
    “… However AES cannot meet the requirements for real time communication. In this paper we have proposed a symmetric encryption algorithm operating at 1024-bits of data…”
    Získat plný text
    Konferenční příspěvek
  8. 8

    Comparative Analysis of Encryption-Decryption Data Use the Symmetrical Key Algorithm of Bit Inserted Carrier (BIC) Autor Alfina, Ommi, Syahputri, Nita, Indriani, Ulfah, Harahap, Dina Irmayanti, Ginting, Erwin

    Vydáno: IEEE 01.08.2018
    “… This study aims to establish a security system by using a cryptographic algorithm called Bit Inserted Carrier (BIC…”
    Získat plný text
    Konferenční příspěvek
  9. 9

    Symmetric Key Encryption Based on Rotation-Translation Equation Autor Stoyanov, Borislav, Nedzhibov, Gyurhan

    ISSN: 2073-8994, 2073-8994
    Vydáno: Basel MDPI AG 01.01.2020
    Vydáno v Symmetry (Basel) (01.01.2020)
    “…–translation equation is proposed. We develop the new encryption-decryption algorithm by using the concept of symmetric key instead of public key…”
    Získat plný text
    Journal Article
  10. 10

    Performance Analysis of Symmetric Encryption Algorithms for their Encryption and Decryption Time Autor Advani, Nilesh Amarbhai, Gonsai, Atul M.

    Vydáno: Bharati Vidyapeeth, New Delhi. Copy Right in Bulk will be transferred to IEEE by Bharati Vidyapeeth 01.03.2019
    “… For this we need various mechanisms for the same. Several symmetric and asymmetric algorithms exist for this purpose…”
    Získat plný text
    Konferenční příspěvek
  11. 11
  12. 12
  13. 13

    A Symmetric Reversible Audio Information Hiding Algorithm Using Matrix Embedding Within Image Carriers Autor Tuo, Yongqiang, Li, Guodong, Hou, Kaiyue

    ISSN: 2073-8994, 2073-8994
    Vydáno: Basel MDPI AG 01.12.2024
    Vydáno v Symmetry (Basel) (01.12.2024)
    “…To address the vulnerability of existing hiding algorithms to differential attacks and the limitations of single chaotic systems, such as small key space and low security, a novel algorithm combining…”
    Získat plný text
    Journal Article
  14. 14
  15. 15

    Disabling Tracing in Black-Box-Traceable CP-ABE System: Alert Decryption Black Box Autor Qiao, Huidong, Ren, Jiangchun, Wang, Zhiying, Hu, Ying

    ISSN: 2073-8994, 2073-8994
    Vydáno: Basel MDPI AG 01.01.2024
    Vydáno v Symmetry (Basel) (01.01.2024)
    “…In application scenarios such as cloud storage, a symmetric algorithm can be used to encrypt massive data…”
    Získat plný text
    Journal Article
  16. 16

    Hybrid cryptosystem RSA - CRT optimization and VMPC Autor Rahmadani, R, Mawengkang, H, Sutarman

    ISSN: 1742-6588, 1742-6596
    Vydáno: Bristol IOP Publishing 01.03.2018
    Vydáno v Journal of physics. Conference series (01.03.2018)
    “…Hybrid cryptosystem combines symmetric algorithms and asymmetric algorithms. This combination utilizes speeds on encryption/decryption processes of symmetric algorithms and asymmetric algorithms to secure symmetric keys…”
    Získat plný text
    Journal Article
  17. 17
  18. 18

    An efficient mixed mode and paired cipher text cryptographic algorithm for effective key distribution Autor S, Rasmi P, Paul, Varghese

    ISSN: 1074-5351, 1099-1131
    Vydáno: Chichester Blackwell Publishing Ltd 01.11.2014
    “… (hidden root problem, discrete logarithms, and factoring) to make the algorithm too secure and uses the properties of both symmetric and asymmetric key algorithms…”
    Získat plný text
    Journal Article
  19. 19

    Security algorithm of Internet of Things based on ZigBee protocol Autor Wang, Yongkang, Chen, Chunxia, Jiang, Qijie

    ISSN: 1386-7857, 1573-7543
    Vydáno: New York Springer US 01.11.2019
    Vydáno v Cluster computing (01.11.2019)
    “… Then, the principle of AES-128 algorithm is analyzed, and the steps of decryption algorithm are adjusted, so that the decryption algorithm is symmetric in structure and encryption algorithm…”
    Získat plný text
    Journal Article
  20. 20

    Quantum Image Encryption and Decryption Algorithms Based on Quantum Image Geometric Transformations Autor Zhou, Ri-Gui, Wu, Qian, Zhang, Man-Qun, Shen, Chen-Yi

    ISSN: 0020-7748, 1572-9575
    Vydáno: Boston Springer US 01.06.2013
    “… Although following the symmetric cryptosystem for which the participations in the communication keep exactly the same keys, the special for the encryption and decryption algorithms proposed…”
    Získat plný text
    Journal Article