Search Results - "Decryption algorithm"

Refine Results
  1. 1

    QR code-based ECG signal encryption/decryption algorithm by Mathivanan, P., Ganesh, A. Balaji, Venkatesan, R.

    ISSN: 0161-1194, 1558-1586
    Published: West Point Taylor & Francis 04.05.2019
    Published in Cryptologia (04.05.2019)
    “…The paper presents a novel and enhanced bio-signal (ECG) cryptographic technique in which a QR code has been successfully utilized as a data container. The…”
    Get full text
    Journal Article
  2. 2

    Encryption and decryption algorithm based on the Latin groupoid isotopes by Chiriac, Liubomir, Danilov, Aurel, Bogdanova, Violeta

    ISSN: 2537-6284, 2587-3644
    Published: "Ion Creanga" State Pedagogical University 01.09.2023
    “…This paper studies encryption and decryption algorithm, using isotopes of Latin groupoid…”
    Get full text
    Journal Article
  3. 3

    A Hybrid Encryption and Decryption Algorithm using Caesar and Vigenere Cipher by Tan, Camille Merlin S., Arada, Gerald P., Abad, Alexander C., Magsino, Elmer R.

    ISSN: 1742-6588, 1742-6596
    Published: Bristol IOP Publishing 01.08.2021
    Published in Journal of physics. Conference series (01.08.2021)
    “…This paper presents a hybrid encryption and decryption algorithm, which combines the concept of Caesar Cipher and Vigenere Cipher algorithms…”
    Get full text
    Journal Article
  4. 4

    A Fast Text-to-Image Encryption-Decryption Algorithm for Secure Network Communication by Noor, Noor Sattar, Hammood, Dalal Abdulmohsin, Al-Naji, Ali, Chahl, Javaan

    ISSN: 2073-431X, 2073-431X
    Published: Basel MDPI AG 01.03.2022
    Published in Computers (Basel) (01.03.2022)
    “…Data security is the science of protecting data in information technology, including authentication, data encryption, data decryption, data recovery, and user…”
    Get full text
    Journal Article
  5. 5

    A Novel DNA Computing Based Encryption and Decryption Algorithm by UbaidurRahman, Noorul Hussain, Balamurugan, Chithralekha, Mariappan, Rajapandian

    ISSN: 1877-0509, 1877-0509
    Published: Elsevier B.V 2015
    Published in Procedia computer science (2015)
    “… and decryption algorithm and also provide an analysis of its performance…”
    Get full text
    Journal Article
  6. 6

    A Cyber Security Model Using Gaussian Noise for Text Encryption and Decryption Algorithm by Majeed, Sundus Hatem

    ISSN: 2549-9610, 2549-9904
    Published: 30.09.2025
    “…Cybersecurity has become a critical issue in protecting personal information for all internet users, so the need to protect such information through different…”
    Get full text
    Journal Article
  7. 7

    Encryption and decryption algorithm using algebraic matrix approach by Thiagarajan, K, Balasubramanian, P, Nagaraj, J, Padmashree, J

    ISSN: 1742-6588, 1742-6596
    Published: Bristol IOP Publishing 01.04.2018
    Published in Journal of physics. Conference series (01.04.2018)
    “… The goal of this paper is to study the encryption and decryption algorithm and to find space complexity of the encrypted and decrypted data by using of algorithm…”
    Get full text
    Journal Article
  8. 8

    Towards data storage scheme in blockchain based serverless environment: AES encryption and decryption algorithm approach by Kandpal, Meenakshi, Pritwani, Yash, Misra, Chinmaya, Yadav, Amrendra, Barik, Rabindra

    ISSN: 0353-3670, 2217-5997
    Published: 01.06.2024
    “…In today's digital age, data storage has become an increasingly important issue. The exponential growth of data has led to the need for secure and private…”
    Get full text
    Journal Article
  9. 9

    Local thinning of 3D stereo images based on symmetric decryption algorithm by Wu, Chenglin, Li, Zhaoyang

    ISSN: 0141-9331, 1872-9436
    Published: Kidlington Elsevier B.V 01.04.2021
    Published in Microprocessors and microsystems (01.04.2021)
    “… Based on the symmetric decryption algorithm, this method acquires the symmetric information of 3-D stereo image, filters out the pseudo-feature points, extracts the local detail features of 3-D…”
    Get full text
    Journal Article
  10. 10

    RL-BLED: A Reversible Logic Design of Bit Level Encryption/Decryption Algorithm for Secure Mammogram Data Transmission by Guptha, M. N. Sharada, Eshwarappa, M. N.

    ISSN: 0929-6212, 1572-834X
    Published: New York Springer US 01.07.2022
    Published in Wireless personal communications (01.07.2022)
    “…Security is an essential task while focusing on confidential level of patient information during medical data transmission. The image encryption algorithms…”
    Get full text
    Journal Article
  11. 11
  12. 12
  13. 13

    Image based Steganography in Cryptography implementing different Encryption-Decryption Algorithm by Dutta, Pinky Saikia, Chakraborty, Sauvik

    ISSN: 2456-3307, 2456-3307
    Published: 20.07.2020
    “…Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-secure method in which…”
    Get full text
    Journal Article
  14. 14

    10 Clock-Periods Pipelined Implementation of AES-128 Encryption-Decryption Algorithm up to 28 Gbit/s Real Throughput by Xilinx Zynq UltraScale+ MPSoC ZCU102 Platform by Visconti, Paolo, Capoccia, Stefano, Venere, Eugenio, Velázquez, Ramiro, Fazio, Roberto de

    ISSN: 2079-9292, 2079-9292
    Published: Basel MDPI AG 01.10.2020
    Published in Electronics (Basel) (01.10.2020)
    “…The security of communication and computer systems is an increasingly important issue, nowadays pervading all areas of human activity (e.g., credit cards,…”
    Get full text
    Journal Article
  15. 15
  16. 16

    Real-Time Encryption/Decryption Algorithm with A Fractional Chaotic System of Various Data: Image, Speech, and Text by Ataş, Muhammet Taha, Güler, Hasan

    ISSN: 2349-5103, 2199-5796
    Published: New Delhi Springer India 01.08.2022
    “…Nowadays, a fractional-order chaotic system is commonly used in digital cryptosystem applications due to its precision to initial conditions and their…”
    Get full text
    Journal Article
  17. 17

    Energy Optimization on Symmetric Key Encryption and Decryption Algorithm using Genetic Algorithm by Mishra, Ratnesh, Shukla, Ravi Shanker, Shukla, Rajesh K., Tewari, R.R.

    ISSN: 2278-3075, 2278-3075
    Published: 30.08.2019
    “…In this paper we have proposed energy optimization on symmetric key encryption and decryption algorithm are using genetic algorithm where we have used symmetric key for encryption…”
    Get full text
    Journal Article
  18. 18

    A Practical Privacy-Preserving Data Aggregation (3PDA) Scheme for Smart Grid by Liu, Yining, Guo, Wei, Fan, Chun-I, Chang, Liang, Cheng, Chi

    ISSN: 1551-3203, 1941-0050
    Published: IEEE 01.03.2019
    “…The real-time electricity consumption data can be used in value-added service such as big data analysis, meanwhile the single user's privacy needs to be…”
    Get full text
    Journal Article
  19. 19

    A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography by Rathore, Manjari Singh, Poongodi, M., Saurabh, Praneet, Lilhore, Umesh Kumar, Bourouis, Sami, Alhakami, Wajdi, Osamor, Jude, Hamdi, Mounir

    ISSN: 0045-7906, 1879-0755
    Published: Elsevier Ltd 01.09.2022
    Published in Computers & electrical engineering (01.09.2022)
    “…•This research emphasizes enhancing data security in real-time IoV communication considering secure communication also presents a trust-driven privacy method…”
    Get full text
    Journal Article
  20. 20

    DES encryption and decryption algorithm implementation based on FPGA by Zeebaree, Subhi R. M.

    ISSN: 2502-4752, 2502-4760
    Published: 01.05.2020
    “…Nowadays there is a lot of importance given to data security on the internet. The DES is one of the most preferred block cipher encryption/decryption…”
    Get full text
    Journal Article