Search Results - Symmetric decryption algorithm
-
1
Local thinning of 3D stereo images based on symmetric decryption algorithm
ISSN: 0141-9331, 1872-9436Published: Kidlington Elsevier B.V 01.04.2021Published in Microprocessors and microsystems (01.04.2021)“… Based on the symmetric decryption algorithm, this method acquires the symmetric information of 3-D stereo image, filters out the pseudo-feature points, extracts the local detail features of 3-D…”
Get full text
Journal Article -
2
Energy Optimization on Symmetric Key Encryption and Decryption Algorithm using Genetic Algorithm
ISSN: 2278-3075, 2278-3075Published: 30.08.2019Published in International journal of innovative technology and exploring engineering (30.08.2019)“…In this paper we have proposed energy optimization on symmetric key encryption and decryption algorithm are using genetic algorithm where we have used symmetric key for encryption…”
Get full text
Journal Article -
3
Baby-Step 2k-ary Adult-Step Algorithm for Symmetric-Key Decryption
ISSN: 2289-0238Published: 30.04.2015Published in The Journal of The Institute of Internet, Broadcasting and Communication (30.04.2015)Get full text
Journal Article -
4
Numerical algorithms for corner-modified symmetric Toeplitz linear system with applications to image encryption and decryption
ISSN: 1598-5865, 1865-2085Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.04.2023Published in Journal of applied mathematics & computing (01.04.2023)“… Based on the decomposition of Toeplitz inversion and order-reduction algorithm, two new algorithms for the product of symmetric Toplitz inversion and the vector are proposed…”
Get full text
Journal Article -
5
Improvement security in e-business systems using hybrid algorithm
ISSN: 1693-6930, 2302-9293Published: Yogyakarta Ahmad Dahlan University 01.10.2021Published in Telkomnika (01.10.2021)“… Encryption and decryption of messages or information carried by a symmetric key using the simple symmetric key algorithm and asymmetric keys using the Rivest Shamir Adleman (RSA) algorithm…”
Get full text
Journal Article -
6
A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets
Published: IEEE 01.01.2015Published in 2015 International Conference on Networking Systems and Security (NSysS) (01.01.2015)“…This paper presents a comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets through simulation…”
Get full text
Conference Proceeding -
7
Efficient implementation of 1024-bit symmetric encryption and decryption algorithm for real time communication systems
ISBN: 9781467351584, 146735158XPublished: IEEE 01.12.2012Published in 2012 IEEE Student Conference on Research and Development (SCOReD) (01.12.2012)“… However AES cannot meet the requirements for real time communication. In this paper we have proposed a symmetric encryption algorithm operating at 1024-bits of data…”
Get full text
Conference Proceeding -
8
Comparative Analysis of Encryption-Decryption Data Use the Symmetrical Key Algorithm of Bit Inserted Carrier (BIC)
Published: IEEE 01.08.2018Published in 2018 6th International Conference on Cyber and IT Service Management (CITSM) (01.08.2018)“… This study aims to establish a security system by using a cryptographic algorithm called Bit Inserted Carrier (BIC…”
Get full text
Conference Proceeding -
9
Symmetric Key Encryption Based on Rotation-Translation Equation
ISSN: 2073-8994, 2073-8994Published: Basel MDPI AG 01.01.2020Published in Symmetry (Basel) (01.01.2020)“…–translation equation is proposed. We develop the new encryption-decryption algorithm by using the concept of symmetric key instead of public key…”
Get full text
Journal Article -
10
Performance Analysis of Symmetric Encryption Algorithms for their Encryption and Decryption Time
Published: Bharati Vidyapeeth, New Delhi. Copy Right in Bulk will be transferred to IEEE by Bharati Vidyapeeth 01.03.2019Published in 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom) (01.03.2019)“… For this we need various mechanisms for the same. Several symmetric and asymmetric algorithms exist for this purpose…”
Get full text
Conference Proceeding -
11
US Patent Issued to China IWNCOMM on June 21 for "Method for conducting data encryption and decryption using symmetric cryptography algorithm and table look-up device" (Chinese Inventor)
Published: Washington, D.C HT Digital Streams Limited 28.06.2016Published in US Fed News Service, Including US State News (28.06.2016)Get full text
Newsletter -
12
WIPO PUBLISHES PATENT OF CHINA IWNCOMM FOR "METHOD FOR CONDUCTING DATA ENCRYPTION AND DECRYPTION USING SYMMETRIC CRYPTOGRAPHY ALGORITHM AND TABLE LOOK-UP DEVICE" (CHINESE INVENTORS)
Published: Washington, D.C HT Digital Streams Limited 27.12.2013Published in US Fed News Service, Including US State News (27.12.2013)Get full text
Newsletter -
13
A Symmetric Reversible Audio Information Hiding Algorithm Using Matrix Embedding Within Image Carriers
ISSN: 2073-8994, 2073-8994Published: Basel MDPI AG 01.12.2024Published in Symmetry (Basel) (01.12.2024)“…To address the vulnerability of existing hiding algorithms to differential attacks and the limitations of single chaotic systems, such as small key space and low security, a novel algorithm combining…”
Get full text
Journal Article -
14
A COMPARATIVE STUDY OF SYMMETRIC KEY ALGORITHM DES, AES AND BLOWFISH FOR VIDEO ENCRYPTION AND DECRYPTION
ISSN: 2348-6406, 2348-4470Published: 31.05.2017Published in International Journal of Advance Engineering and Research Development (31.05.2017)Get full text
Journal Article -
15
Disabling Tracing in Black-Box-Traceable CP-ABE System: Alert Decryption Black Box
ISSN: 2073-8994, 2073-8994Published: Basel MDPI AG 01.01.2024Published in Symmetry (Basel) (01.01.2024)“…In application scenarios such as cloud storage, a symmetric algorithm can be used to encrypt massive data…”
Get full text
Journal Article -
16
Hybrid cryptosystem RSA - CRT optimization and VMPC
ISSN: 1742-6588, 1742-6596Published: Bristol IOP Publishing 01.03.2018Published in Journal of physics. Conference series (01.03.2018)“…Hybrid cryptosystem combines symmetric algorithms and asymmetric algorithms. This combination utilizes speeds on encryption/decryption processes of symmetric algorithms and asymmetric algorithms to secure symmetric keys…”
Get full text
Journal Article -
17
COMPARITIVE ANALYSIS OF SYMMETRIC KEY ALGORITHMS: DES, AES AND BLOWFISH FOR AUDIO ENCRYPTION AND DECRYPTION
ISSN: 2348-6406, 2348-4470Published: 31.05.2017Published in International Journal of Advance Engineering and Research Development (31.05.2017)Get full text
Journal Article -
18
An efficient mixed mode and paired cipher text cryptographic algorithm for effective key distribution
ISSN: 1074-5351, 1099-1131Published: Chichester Blackwell Publishing Ltd 01.11.2014Published in International journal of communication systems (01.11.2014)“… (hidden root problem, discrete logarithms, and factoring) to make the algorithm too secure and uses the properties of both symmetric and asymmetric key algorithms…”
Get full text
Journal Article -
19
Security algorithm of Internet of Things based on ZigBee protocol
ISSN: 1386-7857, 1573-7543Published: New York Springer US 01.11.2019Published in Cluster computing (01.11.2019)“… Then, the principle of AES-128 algorithm is analyzed, and the steps of decryption algorithm are adjusted, so that the decryption algorithm is symmetric in structure and encryption algorithm…”
Get full text
Journal Article -
20
Quantum Image Encryption and Decryption Algorithms Based on Quantum Image Geometric Transformations
ISSN: 0020-7748, 1572-9575Published: Boston Springer US 01.06.2013Published in International journal of theoretical physics (01.06.2013)“… Although following the symmetric cryptosystem for which the participations in the communication keep exactly the same keys, the special for the encryption and decryption algorithms proposed…”
Get full text
Journal Article

