Search Results - "Decryption algorithm"
-
1
A Coding Algorithm using Super-edge Magic Total Labeling of Extended Duplicate Graphs
Published: IEEE 08.09.2022Published in 2022 Second International Conference on Computer Science, Engineering and Applications (ICCSEA) (08.09.2022)“… understands the message and others could not. Graph labeling is an assignment of labels (numbers) to vertices or edges or both subject to certain criteria…”
Get full text
Conference Proceeding -
2
Quantum Image Encryption and Decryption Algorithms Based on Quantum Image Geometric Transformations
ISSN: 0020-7748, 1572-9575Published: Boston Springer US 01.06.2013Published in International journal of theoretical physics (01.06.2013)“… Although following the symmetric cryptosystem for which the participations in the communication keep exactly the same keys, the special for the encryption and decryption algorithms proposed…”
Get full text
Journal Article -
3
Sampled-data synchronization for fuzzy inertial cellular neural networks and its application in secure communication
ISSN: 0893-6080, 1879-2782, 1879-2782Published: United States Elsevier Ltd 01.12.2024Published in Neural networks (01.12.2024)“…This paper designs the sampled-data control (SDC) scheme to delve into the synchronization problem of fuzzy inertial cellular neural networks (FICNNs)…”
Get full text
Journal Article -
4
Secure Forwarding Control for a Class of Nonlinear Systems Using Chaotic Encryption
ISSN: 1934-1768Published: Technical Committee on Control Theory, Chinese Association of Automation 28.07.2025Published in Chinese Control Conference (28.07.2025)“… Based on system invertibility, a chaotic decryption algorithm is proposed to recover the plain measurements in the receiver…”
Get full text
Conference Proceeding -
5
Endangered Data
ISSN: 2640-9429, 2640-9429Published: eScholarship Publishing, University of California 05.11.2018Published in Refract (05.11.2018)“… private servers and personal computers. This was done in response to the growing concern that data confirming the reality of anthropogenic global warming might be subject to manipulation, repression, or erasure by the current administration…”
Get full text
Journal Article -
6
Cryptographic Algorithm Based on Prime Assignment
ISSN: 2321-9653, 2321-9653Published: 31.01.2022Published in International journal for research in applied science and engineering technology (31.01.2022)“… it. There are several encryption and decryption algorithm which involves mathematical concepts to provide more security to the text which has to be shared through a medium…”
Get full text
Journal Article -
7
EFFICIENT OTP GENERATION WITH ENCRYPTION AND DECRYPTION FOR SECURE FILE ACCESS IN CLOUD ENVIRONMENT
ISSN: 0976-0091, 2229-6948Published: ICT Academy of Tamil Nadu 01.06.2022Published in ICTACT journal on communication technology (01.06.2022)“… The most used computer system authentication mechanism is One Time Password (OTP) which is easier and more successful than other techniques while being subject to assaults such as eavesdropping and replay attacks…”
Get full text
Journal Article -
8
MATHEMATICAL MODEL OF AUTHENTICATION OF A TRANSMITTED MESSAGE BASED ON A MCELIECE SCHEME ON SHORTED AND EXTENDED MODIFIED ELLIPTIC CODES USING UMAC MODIFIED ALGORITHM
ISSN: 2663-4023, 2663-4023Published: 2019Published in Kìberbezpeka. osvìta, nauka, tehnìka (2019)“…The subject of the research is a mathematical model of authentication of the transmitted message based on the McEliese scheme on shortened and elongated modified elliptic codes using the modified UMAC algorithm…”
Get full text
Journal Article -
9
Multi-Factor Analysis of RSA Based on Variations in Primes Used for Modulus Generation
Published: IEEE 08.09.2023Published in 2023 3rd International Conference on Innovative Sustainable Computational Technologies (CISCT) (08.09.2023)“…The RSA cryptosystem encompasses some of the most common and popular encryption-decryption algorithms…”
Get full text
Conference Proceeding -
10
Light-Weight Solution to Defend Implantable Medical Devices against Man-In-The-Middle Attack
ISSN: 2576-6813Published: IEEE 01.12.2018Published in 2018 IEEE Global Communications Conference (GLOBECOM) (01.12.2018)“…Nowadays, Implantable Medical Devices (IMDs) rely mainly on wireless technology for information exchange. In spite of the many advantages wireless technology…”
Get full text
Conference Proceeding -
11
Fast RSA-type cryptosystem with public data of small size
ISSN: 1042-0967, 1520-6440Published: New York Wiley Subscription Services, Inc., A Wiley Company 01.02.1997Published in Electronics & communications in Japan. Part 3, Fundamental electronic science (01.02.1997)“… This paper presents fast encryption and decryption algorithms appropriate for an RSA cryptosystem using a particular form of the modulus n…”
Get full text
Journal Article