Výsledky vyhledávání - Symmetric decryption algorithm
-
1
Local thinning of 3D stereo images based on symmetric decryption algorithm
ISSN: 0141-9331, 1872-9436Vydáno: Kidlington Elsevier B.V 01.04.2021Vydáno v Microprocessors and microsystems (01.04.2021)“… Based on the symmetric decryption algorithm, this method acquires the symmetric information of 3-D stereo image, filters out the pseudo-feature points, extracts the local detail features of 3-D…”
Získat plný text
Journal Article -
2
Energy Optimization on Symmetric Key Encryption and Decryption Algorithm using Genetic Algorithm
ISSN: 2278-3075, 2278-3075Vydáno: 30.08.2019Vydáno v International journal of innovative technology and exploring engineering (30.08.2019)“…In this paper we have proposed energy optimization on symmetric key encryption and decryption algorithm are using genetic algorithm where we have used symmetric key for encryption…”
Získat plný text
Journal Article -
3
Baby-Step 2k-ary Adult-Step Algorithm for Symmetric-Key Decryption
ISSN: 2289-0238Vydáno: 30.04.2015Vydáno v The Journal of The Institute of Internet, Broadcasting and Communication (30.04.2015)Získat plný text
Journal Article -
4
Numerical algorithms for corner-modified symmetric Toeplitz linear system with applications to image encryption and decryption
ISSN: 1598-5865, 1865-2085Vydáno: Berlin/Heidelberg Springer Berlin Heidelberg 01.04.2023Vydáno v Journal of applied mathematics & computing (01.04.2023)“… Based on the decomposition of Toeplitz inversion and order-reduction algorithm, two new algorithms for the product of symmetric Toplitz inversion and the vector are proposed…”
Získat plný text
Journal Article -
5
Improvement security in e-business systems using hybrid algorithm
ISSN: 1693-6930, 2302-9293Vydáno: Yogyakarta Ahmad Dahlan University 01.10.2021Vydáno v Telkomnika (01.10.2021)“… Encryption and decryption of messages or information carried by a symmetric key using the simple symmetric key algorithm and asymmetric keys using the Rivest Shamir Adleman (RSA) algorithm…”
Získat plný text
Journal Article -
6
A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets
Vydáno: IEEE 01.01.2015Vydáno v 2015 International Conference on Networking Systems and Security (NSysS) (01.01.2015)“…This paper presents a comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets through simulation…”
Získat plný text
Konferenční příspěvek -
7
Efficient implementation of 1024-bit symmetric encryption and decryption algorithm for real time communication systems
ISBN: 9781467351584, 146735158XVydáno: IEEE 01.12.2012Vydáno v 2012 IEEE Student Conference on Research and Development (SCOReD) (01.12.2012)“… However AES cannot meet the requirements for real time communication. In this paper we have proposed a symmetric encryption algorithm operating at 1024-bits of data…”
Získat plný text
Konferenční příspěvek -
8
Comparative Analysis of Encryption-Decryption Data Use the Symmetrical Key Algorithm of Bit Inserted Carrier (BIC)
Vydáno: IEEE 01.08.2018Vydáno v 2018 6th International Conference on Cyber and IT Service Management (CITSM) (01.08.2018)“… This study aims to establish a security system by using a cryptographic algorithm called Bit Inserted Carrier (BIC…”
Získat plný text
Konferenční příspěvek -
9
Symmetric Key Encryption Based on Rotation-Translation Equation
ISSN: 2073-8994, 2073-8994Vydáno: Basel MDPI AG 01.01.2020Vydáno v Symmetry (Basel) (01.01.2020)“…–translation equation is proposed. We develop the new encryption-decryption algorithm by using the concept of symmetric key instead of public key…”
Získat plný text
Journal Article -
10
Performance Analysis of Symmetric Encryption Algorithms for their Encryption and Decryption Time
Vydáno: Bharati Vidyapeeth, New Delhi. Copy Right in Bulk will be transferred to IEEE by Bharati Vidyapeeth 01.03.2019Vydáno v 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom) (01.03.2019)“… For this we need various mechanisms for the same. Several symmetric and asymmetric algorithms exist for this purpose…”
Získat plný text
Konferenční příspěvek -
11
US Patent Issued to China IWNCOMM on June 21 for "Method for conducting data encryption and decryption using symmetric cryptography algorithm and table look-up device" (Chinese Inventor)
Vydáno: Washington, D.C HT Digital Streams Limited 28.06.2016Vydáno v US Fed News Service, Including US State News (28.06.2016)Získat plný text
Newsletter -
12
WIPO PUBLISHES PATENT OF CHINA IWNCOMM FOR "METHOD FOR CONDUCTING DATA ENCRYPTION AND DECRYPTION USING SYMMETRIC CRYPTOGRAPHY ALGORITHM AND TABLE LOOK-UP DEVICE" (CHINESE INVENTORS)
Vydáno: Washington, D.C HT Digital Streams Limited 27.12.2013Vydáno v US Fed News Service, Including US State News (27.12.2013)Získat plný text
Newsletter -
13
A Symmetric Reversible Audio Information Hiding Algorithm Using Matrix Embedding Within Image Carriers
ISSN: 2073-8994, 2073-8994Vydáno: Basel MDPI AG 01.12.2024Vydáno v Symmetry (Basel) (01.12.2024)“…To address the vulnerability of existing hiding algorithms to differential attacks and the limitations of single chaotic systems, such as small key space and low security, a novel algorithm combining…”
Získat plný text
Journal Article -
14
A COMPARATIVE STUDY OF SYMMETRIC KEY ALGORITHM DES, AES AND BLOWFISH FOR VIDEO ENCRYPTION AND DECRYPTION
ISSN: 2348-6406, 2348-4470Vydáno: 31.05.2017Vydáno v International Journal of Advance Engineering and Research Development (31.05.2017)Získat plný text
Journal Article -
15
Disabling Tracing in Black-Box-Traceable CP-ABE System: Alert Decryption Black Box
ISSN: 2073-8994, 2073-8994Vydáno: Basel MDPI AG 01.01.2024Vydáno v Symmetry (Basel) (01.01.2024)“…In application scenarios such as cloud storage, a symmetric algorithm can be used to encrypt massive data…”
Získat plný text
Journal Article -
16
Hybrid cryptosystem RSA - CRT optimization and VMPC
ISSN: 1742-6588, 1742-6596Vydáno: Bristol IOP Publishing 01.03.2018Vydáno v Journal of physics. Conference series (01.03.2018)“…Hybrid cryptosystem combines symmetric algorithms and asymmetric algorithms. This combination utilizes speeds on encryption/decryption processes of symmetric algorithms and asymmetric algorithms to secure symmetric keys…”
Získat plný text
Journal Article -
17
COMPARITIVE ANALYSIS OF SYMMETRIC KEY ALGORITHMS: DES, AES AND BLOWFISH FOR AUDIO ENCRYPTION AND DECRYPTION
ISSN: 2348-6406, 2348-4470Vydáno: 31.05.2017Vydáno v International Journal of Advance Engineering and Research Development (31.05.2017)Získat plný text
Journal Article -
18
An efficient mixed mode and paired cipher text cryptographic algorithm for effective key distribution
ISSN: 1074-5351, 1099-1131Vydáno: Chichester Blackwell Publishing Ltd 01.11.2014Vydáno v International journal of communication systems (01.11.2014)“… (hidden root problem, discrete logarithms, and factoring) to make the algorithm too secure and uses the properties of both symmetric and asymmetric key algorithms…”
Získat plný text
Journal Article -
19
Security algorithm of Internet of Things based on ZigBee protocol
ISSN: 1386-7857, 1573-7543Vydáno: New York Springer US 01.11.2019Vydáno v Cluster computing (01.11.2019)“… Then, the principle of AES-128 algorithm is analyzed, and the steps of decryption algorithm are adjusted, so that the decryption algorithm is symmetric in structure and encryption algorithm…”
Získat plný text
Journal Article -
20
Quantum Image Encryption and Decryption Algorithms Based on Quantum Image Geometric Transformations
ISSN: 0020-7748, 1572-9575Vydáno: Boston Springer US 01.06.2013Vydáno v International journal of theoretical physics (01.06.2013)“… Although following the symmetric cryptosystem for which the participations in the communication keep exactly the same keys, the special for the encryption and decryption algorithms proposed…”
Získat plný text
Journal Article

