Suchergebnisse - asymmetric encryption/decryption algorithm

Andere Suchmöglichkeiten:

  1. 1

    Ensuring Cybersecurity of Data Transmission in Limited Energy Consumption Networks von Krasnov, A.N., Prakhova, M.Yu, Novikova, U.V.

    Veröffentlicht: IEEE 06.10.2020
    “… The software options used for the RSA and Diffie-Hellman data encryption and decryption algorithms on both the RTP-04M and the Android-based mobile device sides in the Keil …”
    Volltext
    Tagungsbericht
  2. 2

    First ElGamal Encryption/Decryption Scheme Based on Spiking Neural P Systems with Communication on Request, Weights on Synapses, and Delays in Rules von Rangel, Irepan, Vázquez, Daniel-Eduardo, Vázquez, Eduardo, Duchen, Gonzalo, Avalos, Juan-Gerardo, Sanchez, Giovanny

    ISSN: 2227-7390, 2227-7390
    Veröffentlicht: Basel MDPI AG 01.05.2025
    Veröffentlicht in Mathematics (Basel) (01.05.2025)
    “… Specifically, these systems can be seen as a potential solution to efficiently performing asymmetric algorithms, which are more demanding than symmetric systems …”
    Volltext
    Journal Article
  3. 3

    Hybrid cryptosystem RSA - CRT optimization and VMPC von Rahmadani, R, Mawengkang, H, Sutarman

    ISSN: 1742-6588, 1742-6596
    Veröffentlicht: Bristol IOP Publishing 01.03.2018
    Veröffentlicht in Journal of physics. Conference series (01.03.2018)
    “… Hybrid cryptosystem combines symmetric algorithms and asymmetric algorithms. This combination utilizes speeds on encryption/decryption processes of symmetric algorithms and asymmetric algorithms to secure symmetric keys …”
    Volltext
    Journal Article
  4. 4

    Asymmetric encryption / decryption with pentor and ultra pentor operators von Raufi,Bujar, Luma,Artan, Zenuni,Xhemal

    ISSN: 2146-7390, 2146-7390
    Veröffentlicht: Sakarya Üniversitesi Yayınları 01.04.2012
    Veröffentlicht in The online journal of science and technology (01.04.2012)
    “… Finding new approaches for asymmetric encryption / decryption process represents a milestone in cryptographic research and development …”
    Volltext
    Journal Article
  5. 5

    Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain von Xu, Shiwei, Sun, Ao, Ren, Zhengwei, Zhao, Yizhi, Ni, Qiufen, Tong, Yan

    ISSN: 1382-6905, 1573-2886
    Veröffentlicht: United States Springer US 01.01.2023
    Veröffentlicht in Journal of combinatorial optimization (01.01.2023)
    “… However, current key escrow schemes rely on vulnerable traditional asymmetric encryption/decryption algorithms …”
    Volltext
    Journal Article
  6. 6

    Polynomial Rabin Cryptosystem Based on the Operation of Addition von Yakymenko, Igor, Kasianchuk, Mykhailo, Shylinska, Inna, Shevchuk, Ruslan, Yatskiv, Vasyl, Karpinski, Mikolaj

    ISBN: 9781665410496, 1665410493
    ISSN: 2770-5218
    Veröffentlicht: IEEE 26.09.2022
    “… The analysis of the existing asymmetric encryption / decryption algorithms is carried out, their advantages and disadvantages are determined on the basis of this analysis in the paper …”
    Volltext
    Tagungsbericht
  7. 7

    A Data Encryption Solution for Mobile Health Apps in Cooperation Environments von Silva, Bruno M, Rodrigues, Joel JPC, Canelo, Fábio, Lopes, Ivo C, Zhou, Liang

    ISSN: 1438-8871, 1439-4456, 1438-8871
    Veröffentlicht: Canada Journal of Medical Internet Research 01.04.2013
    Veröffentlicht in Journal of medical Internet research (01.04.2013)
    “… Mobile Health (mHealth) proposes health care delivering anytime and anywhere. It aims to answer several emerging problems in health services, including the …”
    Volltext
    Journal Article
  8. 8

    Quaternion-based Encryption/Decryption of Audio Signal Using Digital Image as a Variable Key von Khalil, M I

    ISSN: 2073-607X, 2076-0930
    Veröffentlicht: Kohat Kohat University of Science and Technology (KUST) 01.08.2017
    “… With the rapid growth of communication technology, cryptography plays a significant role in securing and verification of information exchanged via public …”
    Volltext
    Journal Article
  9. 9

    Virtual instrumentation application for symmetrical and asymmetrical text encryption/decryption studying von Teodorescu, R. M., Lita, I., Cioc, I. B., Visan, D. A.

    ISBN: 9781467366465, 1467366463
    Veröffentlicht: IEEE 01.06.2015
    “… , the symmetrical and asymmetrical encryption algorithms. These encryption and decryption techniques are applied to encrypt and then decrypt a given text, for an easily understanding and verification of the encrypting/decrypting techniques implemented …”
    Volltext
    Tagungsbericht
  10. 10
  11. 11

    Color image encryption via Hénon-zigzag map and chaotic restricted Boltzmann machine over Blockchain von Feixiang, Zhao, Mingzhe, Liu, Kun, Wang, Hong, Zhang

    ISSN: 0030-3992, 1879-2545
    Veröffentlicht: Kidlington Elsevier Ltd 01.03.2021
    Veröffentlicht in Optics and laser technology (01.03.2021)
    “… •A random number generator, chaotic restricted Boltzmann machine (CRBM) is designed.•A color image encryption algorithm using …”
    Volltext
    Journal Article
  12. 12

    Performance Comparison between RSA and El-Gamal Algorithms for Speech Data Encryption and Decryption von Yousif, Sura F.

    ISSN: 1999-8716, 2616-6909
    Veröffentlicht: University of Diyala 01.03.2023
    Veröffentlicht in DIYALA JOURNAL OF ENGINEERING SCIENCES (01.03.2023)
    “… ) and El-Gamal algorithms to encrypt/decrypt the speech signals during transferring over open networks …”
    Volltext
    Journal Article
  13. 13

    Enhanced security of affine ciphers using digraph transformation and a modified three pass protocol von Bete, Seble, Demilew, Samuel Asferaw, Woldegiworgis, Tefera Alagaw, Tsegaye, Getaneh Geto, Girmaw, Dagne Walle

    ISSN: 2045-2322, 2045-2322
    Veröffentlicht: London Nature Publishing Group UK 22.10.2025
    Veröffentlicht in Scientific reports (22.10.2025)
    “… Cryptography, through encryption and decryption processes, is vital for protecting sensitive information from unauthorized access …”
    Volltext
    Journal Article
  14. 14

    A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets von Ahmad, Sahan, Alam, Kazi Md Rokibul, Rahman, Habibur, Tamura, Shinsuke

    Veröffentlicht: IEEE 01.01.2015
    “… This paper presents a comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets through simulation …”
    Volltext
    Tagungsbericht
  15. 15

    Hybrid Encryption/Decryption Embedded System Design Based on ECC, SM3, SM4 von Yang, Peng, Huang, Haisheng, Li, Xin, Zhang, Chi, Zhu, Zhenxing, Zhao, Qi

    Veröffentlicht: IEEE 27.12.2024
    “… ), SM3, SM4 hybrid encryption/decryption system. This utilizes the ECC and SM3 modules to generate SM4 encryption/decryption keys by means of hardware-software co …”
    Volltext
    Tagungsbericht
  16. 16

    Implementation of El-Gamal algorithm for speech signals encryption and decryption von Imran, Omar A., Yousif, Sura F., Hameed, Isam Salah, Al-Din Abed, Wisam Najm, Hammid, Ali Thaeer

    ISSN: 1877-0509, 1877-0509
    Veröffentlicht: Elsevier B.V 2020
    Veröffentlicht in Procedia computer science (2020)
    “… The presented work is concerned with a particular type of asymmetric key cryptography called El-Gamal algorithm to be used for speech signals encryption and decryption …”
    Volltext
    Journal Article
  17. 17

    Concurrent error detection and correction in dual basis multiplier over GF(2 m ) von Chiou, C.W., Lee, C.-Y., Lin, J.-M., Hou, T.-W., Chang, C.-C.

    ISSN: 1751-858X, 1751-8598
    Veröffentlicht: Stevenage Institution of Engineering and Technology 01.02.2009
    Veröffentlicht in IET circuits, devices & systems (01.02.2009)
    “… Fault-based side-channel cryptanalysis is a useful technique against symmetrical and asymmetrical encryption/decryption algorithms …”
    Volltext
    Journal Article
  18. 18

    Texts Ciphering by using Translation Principle von Ali H. Al-Nuaimi

    ISSN: 1609-4042, 2521-3407
    Veröffentlicht: University of Baghdad 01.04.2017
    “… The proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using …”
    Volltext
    Journal Article
  19. 19

    RETRACTED ARTICLE: Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain von Xu, Shiwei, Sun, Ao, Ren, Zhengwei, Zhao, Yizhi, Ni, Qiufen, Tong, Yan

    ISSN: 1382-6905, 1573-2886
    Veröffentlicht: New York Springer US 01.07.2023
    Veröffentlicht in Journal of combinatorial optimization (01.07.2023)
    “… However, current key escrow schemes rely on vulnerable traditional asymmetric encryption/decryption algorithms …”
    Volltext
    Journal Article
  20. 20

    Analysis of Encryption Algorithms (RSA, SRNN and 2 Key Pair) for Information Security von Bonde, Sarika Y., Bhadade, U.S.

    Veröffentlicht: IEEE 01.08.2017
    “… So to protect information, we need to encrypt/decrypt information by using cryptography algorithms …”
    Volltext
    Tagungsbericht