Výsledky vyhľadávania - asymmetric encryption/decryption algorithm
-
1
Ensuring Cybersecurity of Data Transmission in Limited Energy Consumption Networks
Vydavateľské údaje: IEEE 06.10.2020Vydané v 2020 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon) (06.10.2020)“… The software options used for the RSA and Diffie-Hellman data encryption and decryption algorithms on both the RTP-04M and the Android-based mobile device sides in the Keil…”
Získať plný text
Konferenčný príspevok.. -
2
First ElGamal Encryption/Decryption Scheme Based on Spiking Neural P Systems with Communication on Request, Weights on Synapses, and Delays in Rules
ISSN: 2227-7390, 2227-7390Vydavateľské údaje: Basel MDPI AG 01.05.2025Vydané v Mathematics (Basel) (01.05.2025)“… Specifically, these systems can be seen as a potential solution to efficiently performing asymmetric algorithms, which are more demanding than symmetric systems…”
Získať plný text
Journal Article -
3
Hybrid cryptosystem RSA - CRT optimization and VMPC
ISSN: 1742-6588, 1742-6596Vydavateľské údaje: Bristol IOP Publishing 01.03.2018Vydané v Journal of physics. Conference series (01.03.2018)“…Hybrid cryptosystem combines symmetric algorithms and asymmetric algorithms. This combination utilizes speeds on encryption/decryption processes of symmetric algorithms and asymmetric algorithms to secure symmetric keys…”
Získať plný text
Journal Article -
4
Asymmetric encryption / decryption with pentor and ultra pentor operators
ISSN: 2146-7390, 2146-7390Vydavateľské údaje: Sakarya Üniversitesi Yayınları 01.04.2012Vydané v The online journal of science and technology (01.04.2012)“…Finding new approaches for asymmetric encryption / decryption process represents a milestone in cryptographic research and development…”
Získať plný text
Journal Article -
5
Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain
ISSN: 1382-6905, 1573-2886Vydavateľské údaje: United States Springer US 01.01.2023Vydané v Journal of combinatorial optimization (01.01.2023)“… However, current key escrow schemes rely on vulnerable traditional asymmetric encryption/decryption algorithms…”
Získať plný text
Journal Article -
6
Polynomial Rabin Cryptosystem Based on the Operation of Addition
ISBN: 9781665410496, 1665410493ISSN: 2770-5218Vydavateľské údaje: IEEE 26.09.2022Vydané v International Conference on Advanced Computer Information Technologies (Print) (26.09.2022)“…The analysis of the existing asymmetric encryption / decryption algorithms is carried out, their advantages and disadvantages are determined on the basis of this analysis in the paper…”
Získať plný text
Konferenčný príspevok.. -
7
A Data Encryption Solution for Mobile Health Apps in Cooperation Environments
ISSN: 1438-8871, 1439-4456, 1438-8871Vydavateľské údaje: Canada Journal of Medical Internet Research 01.04.2013Vydané v Journal of medical Internet research (01.04.2013)“…Mobile Health (mHealth) proposes health care delivering anytime and anywhere. It aims to answer several emerging problems in health services, including the…”
Získať plný text
Journal Article -
8
Quaternion-based Encryption/Decryption of Audio Signal Using Digital Image as a Variable Key
ISSN: 2073-607X, 2076-0930Vydavateľské údaje: Kohat Kohat University of Science and Technology (KUST) 01.08.2017Vydané v International journal of communication networks and information security (01.08.2017)“…With the rapid growth of communication technology, cryptography plays a significant role in securing and verification of information exchanged via public…”
Získať plný text
Journal Article -
9
Virtual instrumentation application for symmetrical and asymmetrical text encryption/decryption studying
ISBN: 9781467366465, 1467366463Vydavateľské údaje: IEEE 01.06.2015Vydané v 2015 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) (01.06.2015)“…, the symmetrical and asymmetrical encryption algorithms. These encryption and decryption techniques are applied to encrypt and then decrypt a given text, for an easily understanding and verification of the encrypting/decrypting techniques implemented…”
Získať plný text
Konferenčný príspevok.. -
10
Modified RSA Using Triple Keys Based Encryption/Decryption
ISSN: 2409-9600Vydavateľské údaje: 01.03.2021Vydané v Jordan Journal of Electrical Engineering (01.03.2021)Získať plný text
Journal Article -
11
Color image encryption via Hénon-zigzag map and chaotic restricted Boltzmann machine over Blockchain
ISSN: 0030-3992, 1879-2545Vydavateľské údaje: Kidlington Elsevier Ltd 01.03.2021Vydané v Optics and laser technology (01.03.2021)“…•A random number generator, chaotic restricted Boltzmann machine (CRBM) is designed.•A color image encryption algorithm using…”
Získať plný text
Journal Article -
12
Performance Comparison between RSA and El-Gamal Algorithms for Speech Data Encryption and Decryption
ISSN: 1999-8716, 2616-6909Vydavateľské údaje: University of Diyala 01.03.2023Vydané v DIYALA JOURNAL OF ENGINEERING SCIENCES (01.03.2023)“…) and El-Gamal algorithms to encrypt/decrypt the speech signals during transferring over open networks…”
Získať plný text
Journal Article -
13
Enhanced security of affine ciphers using digraph transformation and a modified three pass protocol
ISSN: 2045-2322, 2045-2322Vydavateľské údaje: London Nature Publishing Group UK 22.10.2025Vydané v Scientific reports (22.10.2025)“… Cryptography, through encryption and decryption processes, is vital for protecting sensitive information from unauthorized access…”
Získať plný text
Journal Article -
14
A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets
Vydavateľské údaje: IEEE 01.01.2015Vydané v 2015 International Conference on Networking Systems and Security (NSysS) (01.01.2015)“…This paper presents a comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets through simulation…”
Získať plný text
Konferenčný príspevok.. -
15
Hybrid Encryption/Decryption Embedded System Design Based on ECC, SM3, SM4
Vydavateľské údaje: IEEE 27.12.2024Vydané v 2024 4th International Conference on Communication Technology and Information Technology (ICCTIT) (27.12.2024)“…), SM3, SM4 hybrid encryption/decryption system. This utilizes the ECC and SM3 modules to generate SM4 encryption/decryption keys by means of hardware-software co…”
Získať plný text
Konferenčný príspevok.. -
16
Implementation of El-Gamal algorithm for speech signals encryption and decryption
ISSN: 1877-0509, 1877-0509Vydavateľské údaje: Elsevier B.V 2020Vydané v Procedia computer science (2020)“… The presented work is concerned with a particular type of asymmetric key cryptography called El-Gamal algorithm to be used for speech signals encryption and decryption…”
Získať plný text
Journal Article -
17
Concurrent error detection and correction in dual basis multiplier over GF(2 m )
ISSN: 1751-858X, 1751-8598Vydavateľské údaje: Stevenage Institution of Engineering and Technology 01.02.2009Vydané v IET circuits, devices & systems (01.02.2009)“…Fault-based side-channel cryptanalysis is a useful technique against symmetrical and asymmetrical encryption/decryption algorithms…”
Získať plný text
Journal Article -
18
Texts Ciphering by using Translation Principle
ISSN: 1609-4042, 2521-3407Vydavateľské údaje: University of Baghdad 01.04.2017Vydané v Ibn Al-Haitham Journal for Pure and Applied Sciences (01.04.2017)“…The proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using…”
Získať plný text
Journal Article -
19
RETRACTED ARTICLE: Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain
ISSN: 1382-6905, 1573-2886Vydavateľské údaje: New York Springer US 01.07.2023Vydané v Journal of combinatorial optimization (01.07.2023)“… However, current key escrow schemes rely on vulnerable traditional asymmetric encryption/decryption algorithms…”
Získať plný text
Journal Article -
20
Analysis of Encryption Algorithms (RSA, SRNN and 2 Key Pair) for Information Security
Vydavateľské údaje: IEEE 01.08.2017Vydané v 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA) (01.08.2017)“… So to protect information, we need to encrypt/decrypt information by using cryptography algorithms…”
Získať plný text
Konferenčný príspevok..

