Search Results - "Encryption and Decryption Algorithm"

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Quantum Image Encryption and Decryption Algorithms Based on Quantum Image Geometric Transformations by Zhou, Ri-Gui, Wu, Qian, Zhang, Man-Qun, Shen, Chen-Yi

    ISSN: 0020-7748, 1572-9575
    Published: Boston Springer US 01.06.2013
    “… Although following the symmetric cryptosystem for which the participations in the communication keep exactly the same keys, the special for the encryption and decryption algorithms proposed…”
    Get full text
    Journal Article
  2. 2

    Sampled-data synchronization for fuzzy inertial cellular neural networks and its application in secure communication by Subramaniam, Sasikala, Mani, Prakash

    ISSN: 0893-6080, 1879-2782, 1879-2782
    Published: United States Elsevier Ltd 01.12.2024
    Published in Neural networks (01.12.2024)
    “…This paper designs the sampled-data control (SDC) scheme to delve into the synchronization problem of fuzzy inertial cellular neural networks (FICNNs)…”
    Get full text
    Journal Article
  3. 3

    Cryptographic Algorithm Based on Prime Assignment by Mahalakshmi, M.

    ISSN: 2321-9653, 2321-9653
    Published: 31.01.2022
    “… it. There are several encryption and decryption algorithm which involves mathematical concepts to provide more security to the text which has to be shared through a medium…”
    Get full text
    Journal Article
  4. 4

    EFFICIENT OTP GENERATION WITH ENCRYPTION AND DECRYPTION FOR SECURE FILE ACCESS IN CLOUD ENVIRONMENT by R, Manjupargavi, M.V., Srinath

    ISSN: 0976-0091, 2229-6948
    Published: ICT Academy of Tamil Nadu 01.06.2022
    Published in ICTACT journal on communication technology (01.06.2022)
    “… The most used computer system authentication mechanism is One Time Password (OTP) which is easier and more successful than other techniques while being subject to assaults such as eavesdropping and replay attacks…”
    Get full text
    Journal Article
  5. 5

    MATHEMATICAL MODEL OF AUTHENTICATION OF A TRANSMITTED MESSAGE BASED ON A MCELIECE SCHEME ON SHORTED AND EXTENDED MODIFIED ELLIPTIC CODES USING UMAC MODIFIED ALGORITHM by Havrylova, Alla, Korol, Olha, Milevskyi, Stanyslav

    ISSN: 2663-4023, 2663-4023
    Published: 2019
    “…The subject of the research is a mathematical model of authentication of the transmitted message based on the McEliese scheme on shortened and elongated modified elliptic codes using the modified UMAC algorithm…”
    Get full text
    Journal Article
  6. 6

    Fast RSA-type cryptosystem with public data of small size by Satake, Kenji, Kasahara, Masao

    ISSN: 1042-0967, 1520-6440
    Published: New York Wiley Subscription Services, Inc., A Wiley Company 01.02.1997
    “… This paper presents fast encryption and decryption algorithms appropriate for an RSA cryptosystem using a particular form of the modulus n…”
    Get full text
    Journal Article