Suchergebnisse - Symmetric decryption algorithm
-
1
Local thinning of 3D stereo images based on symmetric decryption algorithm
ISSN: 0141-9331, 1872-9436Veröffentlicht: Kidlington Elsevier B.V 01.04.2021Veröffentlicht in Microprocessors and microsystems (01.04.2021)“… Based on the symmetric decryption algorithm, this method acquires the symmetric information of 3-D stereo image, filters out the pseudo-feature points, extracts the local detail features of 3-D …”
Volltext
Journal Article -
2
Energy Optimization on Symmetric Key Encryption and Decryption Algorithm using Genetic Algorithm
ISSN: 2278-3075, 2278-3075Veröffentlicht: 30.08.2019Veröffentlicht in International journal of innovative technology and exploring engineering (30.08.2019)“… In this paper we have proposed energy optimization on symmetric key encryption and decryption algorithm are using genetic algorithm where we have used symmetric key for encryption …”
Volltext
Journal Article -
3
Baby-Step 2k-ary Adult-Step Algorithm for Symmetric-Key Decryption
ISSN: 2289-0238Veröffentlicht: 30.04.2015Veröffentlicht in The Journal of The Institute of Internet, Broadcasting and Communication (30.04.2015)Volltext
Journal Article -
4
Numerical algorithms for corner-modified symmetric Toeplitz linear system with applications to image encryption and decryption
ISSN: 1598-5865, 1865-2085Veröffentlicht: Berlin/Heidelberg Springer Berlin Heidelberg 01.04.2023Veröffentlicht in Journal of applied mathematics & computing (01.04.2023)“… Based on the decomposition of Toeplitz inversion and order-reduction algorithm, two new algorithms for the product of symmetric Toplitz inversion and the vector are proposed …”
Volltext
Journal Article -
5
Improvement security in e-business systems using hybrid algorithm
ISSN: 1693-6930, 2302-9293Veröffentlicht: Yogyakarta Ahmad Dahlan University 01.10.2021Veröffentlicht in Telkomnika (01.10.2021)“… Encryption and decryption of messages or information carried by a symmetric key using the simple symmetric key algorithm and asymmetric keys using the Rivest Shamir Adleman (RSA) algorithm …”
Volltext
Journal Article -
6
A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets
Veröffentlicht: IEEE 01.01.2015Veröffentlicht in 2015 International Conference on Networking Systems and Security (NSysS) (01.01.2015)“… This paper presents a comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets through simulation …”
Volltext
Tagungsbericht -
7
Efficient implementation of 1024-bit symmetric encryption and decryption algorithm for real time communication systems
ISBN: 9781467351584, 146735158XVeröffentlicht: IEEE 01.12.2012Veröffentlicht in 2012 IEEE Student Conference on Research and Development (SCOReD) (01.12.2012)“… However AES cannot meet the requirements for real time communication. In this paper we have proposed a symmetric encryption algorithm operating at 1024-bits of data …”
Volltext
Tagungsbericht -
8
Comparative Analysis of Encryption-Decryption Data Use the Symmetrical Key Algorithm of Bit Inserted Carrier (BIC)
Veröffentlicht: IEEE 01.08.2018Veröffentlicht in 2018 6th International Conference on Cyber and IT Service Management (CITSM) (01.08.2018)“… This study aims to establish a security system by using a cryptographic algorithm called Bit Inserted Carrier (BIC …”
Volltext
Tagungsbericht -
9
Symmetric Key Encryption Based on Rotation-Translation Equation
ISSN: 2073-8994, 2073-8994Veröffentlicht: Basel MDPI AG 01.01.2020Veröffentlicht in Symmetry (Basel) (01.01.2020)“… –translation equation is proposed. We develop the new encryption-decryption algorithm by using the concept of symmetric key instead of public key …”
Volltext
Journal Article -
10
Performance Analysis of Symmetric Encryption Algorithms for their Encryption and Decryption Time
Veröffentlicht: Bharati Vidyapeeth, New Delhi. Copy Right in Bulk will be transferred to IEEE by Bharati Vidyapeeth 01.03.2019Veröffentlicht in 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom) (01.03.2019)“… For this we need various mechanisms for the same. Several symmetric and asymmetric algorithms exist for this purpose …”
Volltext
Tagungsbericht -
11
US Patent Issued to China IWNCOMM on June 21 for "Method for conducting data encryption and decryption using symmetric cryptography algorithm and table look-up device" (Chinese Inventor)
Veröffentlicht: Washington, D.C HT Digital Streams Limited 28.06.2016Veröffentlicht in US Fed News Service, Including US State News (28.06.2016)Volltext
Newsletter -
12
WIPO PUBLISHES PATENT OF CHINA IWNCOMM FOR "METHOD FOR CONDUCTING DATA ENCRYPTION AND DECRYPTION USING SYMMETRIC CRYPTOGRAPHY ALGORITHM AND TABLE LOOK-UP DEVICE" (CHINESE INVENTORS)
Veröffentlicht: Washington, D.C HT Digital Streams Limited 27.12.2013Veröffentlicht in US Fed News Service, Including US State News (27.12.2013)Volltext
Newsletter -
13
A Symmetric Reversible Audio Information Hiding Algorithm Using Matrix Embedding Within Image Carriers
ISSN: 2073-8994, 2073-8994Veröffentlicht: Basel MDPI AG 01.12.2024Veröffentlicht in Symmetry (Basel) (01.12.2024)“… To address the vulnerability of existing hiding algorithms to differential attacks and the limitations of single chaotic systems, such as small key space and low security, a novel algorithm combining …”
Volltext
Journal Article -
14
A COMPARATIVE STUDY OF SYMMETRIC KEY ALGORITHM DES, AES AND BLOWFISH FOR VIDEO ENCRYPTION AND DECRYPTION
ISSN: 2348-6406, 2348-4470Veröffentlicht: 31.05.2017Veröffentlicht in International Journal of Advance Engineering and Research Development (31.05.2017)Volltext
Journal Article -
15
Disabling Tracing in Black-Box-Traceable CP-ABE System: Alert Decryption Black Box
ISSN: 2073-8994, 2073-8994Veröffentlicht: Basel MDPI AG 01.01.2024Veröffentlicht in Symmetry (Basel) (01.01.2024)“… In application scenarios such as cloud storage, a symmetric algorithm can be used to encrypt massive data …”
Volltext
Journal Article -
16
Hybrid cryptosystem RSA - CRT optimization and VMPC
ISSN: 1742-6588, 1742-6596Veröffentlicht: Bristol IOP Publishing 01.03.2018Veröffentlicht in Journal of physics. Conference series (01.03.2018)“… Hybrid cryptosystem combines symmetric algorithms and asymmetric algorithms. This combination utilizes speeds on encryption/decryption processes of symmetric algorithms and asymmetric algorithms to secure symmetric keys …”
Volltext
Journal Article -
17
COMPARITIVE ANALYSIS OF SYMMETRIC KEY ALGORITHMS: DES, AES AND BLOWFISH FOR AUDIO ENCRYPTION AND DECRYPTION
ISSN: 2348-6406, 2348-4470Veröffentlicht: 31.05.2017Veröffentlicht in International Journal of Advance Engineering and Research Development (31.05.2017)Volltext
Journal Article -
18
An efficient mixed mode and paired cipher text cryptographic algorithm for effective key distribution
ISSN: 1074-5351, 1099-1131Veröffentlicht: Chichester Blackwell Publishing Ltd 01.11.2014Veröffentlicht in International journal of communication systems (01.11.2014)“… (hidden root problem, discrete logarithms, and factoring) to make the algorithm too secure and uses the properties of both symmetric and asymmetric key algorithms …”
Volltext
Journal Article -
19
Security algorithm of Internet of Things based on ZigBee protocol
ISSN: 1386-7857, 1573-7543Veröffentlicht: New York Springer US 01.11.2019Veröffentlicht in Cluster computing (01.11.2019)“… Then, the principle of AES-128 algorithm is analyzed, and the steps of decryption algorithm are adjusted, so that the decryption algorithm is symmetric in structure and encryption algorithm …”
Volltext
Journal Article -
20
Quantum Image Encryption and Decryption Algorithms Based on Quantum Image Geometric Transformations
ISSN: 0020-7748, 1572-9575Veröffentlicht: Boston Springer US 01.06.2013Veröffentlicht in International journal of theoretical physics (01.06.2013)“… Although following the symmetric cryptosystem for which the participations in the communication keep exactly the same keys, the special for the encryption and decryption algorithms proposed …”
Volltext
Journal Article

