Search Results - Symmetric decryption algorithm

Refine Results
  1. 1

    Local thinning of 3D stereo images based on symmetric decryption algorithm by Wu, Chenglin, Li, Zhaoyang

    ISSN: 0141-9331, 1872-9436
    Published: Kidlington Elsevier B.V 01.04.2021
    Published in Microprocessors and microsystems (01.04.2021)
    “… Based on the symmetric decryption algorithm, this method acquires the symmetric information of 3-D stereo image, filters out the pseudo-feature points, extracts the local detail features of 3-D…”
    Get full text
    Journal Article
  2. 2

    Energy Optimization on Symmetric Key Encryption and Decryption Algorithm using Genetic Algorithm by Mishra, Ratnesh, Shukla, Ravi Shanker, Shukla, Rajesh K., Tewari, R.R.

    ISSN: 2278-3075, 2278-3075
    Published: 30.08.2019
    “…In this paper we have proposed energy optimization on symmetric key encryption and decryption algorithm are using genetic algorithm where we have used symmetric key for encryption…”
    Get full text
    Journal Article
  3. 3
  4. 4

    Numerical algorithms for corner-modified symmetric Toeplitz linear system with applications to image encryption and decryption by Zhang, Xing, Zheng, Yanpeng, Jiang, Zhaolin, Byun, Heejung

    ISSN: 1598-5865, 1865-2085
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.04.2023
    Published in Journal of applied mathematics & computing (01.04.2023)
    “… Based on the decomposition of Toeplitz inversion and order-reduction algorithm, two new algorithms for the product of symmetric Toplitz inversion and the vector are proposed…”
    Get full text
    Journal Article
  5. 5

    Improvement security in e-business systems using hybrid algorithm by Sumaryanti, L., Kusuma, Dedy Hidayat, Widijastuti, Rosmala, Muzaki, Muhammad Najibulloh

    ISSN: 1693-6930, 2302-9293
    Published: Yogyakarta Ahmad Dahlan University 01.10.2021
    Published in Telkomnika (01.10.2021)
    “… Encryption and decryption of messages or information carried by a symmetric key using the simple symmetric key algorithm and asymmetric keys using the Rivest Shamir Adleman (RSA) algorithm…”
    Get full text
    Journal Article
  6. 6

    A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets by Ahmad, Sahan, Alam, Kazi Md Rokibul, Rahman, Habibur, Tamura, Shinsuke

    Published: IEEE 01.01.2015
    “…This paper presents a comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets through simulation…”
    Get full text
    Conference Proceeding
  7. 7

    Efficient implementation of 1024-bit symmetric encryption and decryption algorithm for real time communication systems by Ishfaq, Abubakar, Naqash, Talha, Hasan, M. Amish, Mukhtar, Amir, Ashraf Ch, M.Ali, Mujahid, Umar, Najam-ul-Islam, M.

    ISBN: 9781467351584, 146735158X
    Published: IEEE 01.12.2012
    “… However AES cannot meet the requirements for real time communication. In this paper we have proposed a symmetric encryption algorithm operating at 1024-bits of data…”
    Get full text
    Conference Proceeding
  8. 8

    Comparative Analysis of Encryption-Decryption Data Use the Symmetrical Key Algorithm of Bit Inserted Carrier (BIC) by Alfina, Ommi, Syahputri, Nita, Indriani, Ulfah, Harahap, Dina Irmayanti, Ginting, Erwin

    Published: IEEE 01.08.2018
    “… This study aims to establish a security system by using a cryptographic algorithm called Bit Inserted Carrier (BIC…”
    Get full text
    Conference Proceeding
  9. 9

    Symmetric Key Encryption Based on Rotation-Translation Equation by Stoyanov, Borislav, Nedzhibov, Gyurhan

    ISSN: 2073-8994, 2073-8994
    Published: Basel MDPI AG 01.01.2020
    Published in Symmetry (Basel) (01.01.2020)
    “…–translation equation is proposed. We develop the new encryption-decryption algorithm by using the concept of symmetric key instead of public key…”
    Get full text
    Journal Article
  10. 10

    Performance Analysis of Symmetric Encryption Algorithms for their Encryption and Decryption Time by Advani, Nilesh Amarbhai, Gonsai, Atul M.

    Published: Bharati Vidyapeeth, New Delhi. Copy Right in Bulk will be transferred to IEEE by Bharati Vidyapeeth 01.03.2019
    “… For this we need various mechanisms for the same. Several symmetric and asymmetric algorithms exist for this purpose…”
    Get full text
    Conference Proceeding
  11. 11
  12. 12
  13. 13

    A Symmetric Reversible Audio Information Hiding Algorithm Using Matrix Embedding Within Image Carriers by Tuo, Yongqiang, Li, Guodong, Hou, Kaiyue

    ISSN: 2073-8994, 2073-8994
    Published: Basel MDPI AG 01.12.2024
    Published in Symmetry (Basel) (01.12.2024)
    “…To address the vulnerability of existing hiding algorithms to differential attacks and the limitations of single chaotic systems, such as small key space and low security, a novel algorithm combining…”
    Get full text
    Journal Article
  14. 14
  15. 15

    Disabling Tracing in Black-Box-Traceable CP-ABE System: Alert Decryption Black Box by Qiao, Huidong, Ren, Jiangchun, Wang, Zhiying, Hu, Ying

    ISSN: 2073-8994, 2073-8994
    Published: Basel MDPI AG 01.01.2024
    Published in Symmetry (Basel) (01.01.2024)
    “…In application scenarios such as cloud storage, a symmetric algorithm can be used to encrypt massive data…”
    Get full text
    Journal Article
  16. 16

    Hybrid cryptosystem RSA - CRT optimization and VMPC by Rahmadani, R, Mawengkang, H, Sutarman

    ISSN: 1742-6588, 1742-6596
    Published: Bristol IOP Publishing 01.03.2018
    Published in Journal of physics. Conference series (01.03.2018)
    “…Hybrid cryptosystem combines symmetric algorithms and asymmetric algorithms. This combination utilizes speeds on encryption/decryption processes of symmetric algorithms and asymmetric algorithms to secure symmetric keys…”
    Get full text
    Journal Article
  17. 17
  18. 18

    An efficient mixed mode and paired cipher text cryptographic algorithm for effective key distribution by S, Rasmi P, Paul, Varghese

    ISSN: 1074-5351, 1099-1131
    Published: Chichester Blackwell Publishing Ltd 01.11.2014
    “… (hidden root problem, discrete logarithms, and factoring) to make the algorithm too secure and uses the properties of both symmetric and asymmetric key algorithms…”
    Get full text
    Journal Article
  19. 19

    Security algorithm of Internet of Things based on ZigBee protocol by Wang, Yongkang, Chen, Chunxia, Jiang, Qijie

    ISSN: 1386-7857, 1573-7543
    Published: New York Springer US 01.11.2019
    Published in Cluster computing (01.11.2019)
    “… Then, the principle of AES-128 algorithm is analyzed, and the steps of decryption algorithm are adjusted, so that the decryption algorithm is symmetric in structure and encryption algorithm…”
    Get full text
    Journal Article
  20. 20

    Quantum Image Encryption and Decryption Algorithms Based on Quantum Image Geometric Transformations by Zhou, Ri-Gui, Wu, Qian, Zhang, Man-Qun, Shen, Chen-Yi

    ISSN: 0020-7748, 1572-9575
    Published: Boston Springer US 01.06.2013
    “… Although following the symmetric cryptosystem for which the participations in the communication keep exactly the same keys, the special for the encryption and decryption algorithms proposed…”
    Get full text
    Journal Article