Search Results - "Encryption and Decryption Algorithm"

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Encryption and decryption algorithm based on the Latin groupoid isotopes by Chiriac, Liubomir, Danilov, Aurel, Bogdanova, Violeta

    ISSN: 2537-6284, 2587-3644
    Published: "Ion Creanga" State Pedagogical University 01.09.2023
    “…This paper studies encryption and decryption algorithm, using isotopes of Latin groupoid. Cryptographic algorithms are computationally intensive processes…”
    Get full text
    Journal Article
  2. 2

    A plaintext-related image encryption algorithm based on chaos by Zhang, Yong, Tang, Yingjun

    ISSN: 1380-7501, 1573-7721
    Published: New York Springer US 01.03.2018
    Published in Multimedia tools and applications (01.03.2018)
    “…A symmetric key image cryptosystem based on the piecewise linear map is presented in this paper. In this cryptosystem, the encryption process and the…”
    Get full text
    Journal Article
  3. 3

    An efficient medical image encryption scheme for (WBAN) based on adaptive DNA and modern multi chaotic map by Abdelfatah, Roayat Ismail, Saqr, Hager Mohamed, Nasr, Mohamed E.

    ISSN: 1380-7501, 1573-7721
    Published: New York Springer US 01.06.2023
    Published in Multimedia tools and applications (01.06.2023)
    “…A Wireless Body Area Network (WBAN) is a network of wireless sensor nodes that can be installed inside or outside of the human body. This network is crucial in…”
    Get full text
    Journal Article
  4. 4

    FPGA Accelerator for 3DES Algorithm Based on OpenCL by WU Jianfeng, ZHENG Bowen, NIE Yi, CHAI Zhilei

    ISSN: 1000-3428
    Published: Editorial Office of Computer Engineering 01.12.2021
    Published in Ji suan ji gong cheng (01.12.2021)
    “…Nowadays, encryption and decryption algorithms are widely used in digital currency, blockchain, cloud data encryption and other fields.Traditional…”
    Get full text
    Journal Article
  5. 5

    A Secure Transmission Method of Network Communication Data Based on Symmetric Key Encryption Algorithm by Cai, Wentian, Yao, Huijun

    ISSN: 0929-6212, 1572-834X
    Published: New York Springer US 01.11.2022
    Published in Wireless personal communications (01.11.2022)
    “…In order to solve the problems of low transmission efficiency and high transmission bit error rate in traditional transmission methods, a new secure…”
    Get full text
    Journal Article
  6. 6
  7. 7
  8. 8

    Cryptography and Adversarial Analysis for Cloud Data Security by Manjula, S., Valarmathi, K., Sudha, M.Swarna

    Published: IEEE 15.03.2024
    “…Cloud computing, a novel paradigm for distributed data processing, has emerged as a transformative technology enabling the storage and retrieval of data over…”
    Get full text
    Conference Proceeding
  9. 9

    Power Data Collection Terminal Protection Based On SM9 by Piao, Liu, NuanQiang, Ye, HanXian, Han, Man, Luo Jin, ShuFeng, Yang, RuiJue, Feng, MengZhen, Song

    ISSN: 2642-6226
    Published: IEEE 08.12.2021
    “…With the proposal of the development plan of the Power and Internet of things, the power data collection terminal has received strong attention. However, due…”
    Get full text
    Conference Proceeding
  10. 10

    Performance Test and Analysis of National Secret Algorithm SM2 in Power Data Protection by Li, Xuandong, Li, Zhifeng, Zeng, Xianyu, Yang, Shufeng, Liang, Haoran, Chen, Ziqiu

    Published: IEEE 22.10.2021
    “…Power data contains a wealth of privacy information. Data protection has always been an urgent problem to pay attention to. Domestic cryptographic algorithm is…”
    Get full text
    Conference Proceeding
  11. 11

    Analysis of the influence of CAN bus encryption and decryption on real time performance by Chong, Tonghong, Liu, Tianyu, Zhang, Yanan, Ma, Chao, Jia, Xianfeng, Wu, Zhi

    Published: IEEE 01.07.2021
    “…With the rapid development of intelligent network connected vehicle, information security has been paid more and more attention. In order to solve the problem…”
    Get full text
    Conference Proceeding
  12. 12

    Building a Secure Decentralized Energy System with Remote Monitoring Using Mobile Agents by Eldegwi, H. M., Badawy, M. B., Kelash, Hamdy M.

    Published: IEEE 01.10.2015
    “…Centralized systems have failed in remote rural areas due to weak infrastructures, roads between urban habitations are in a very bad condition even if found,…”
    Get full text
    Conference Proceeding
  13. 13

    Applying decentralized approach based on mobile agent for improving e-transaction system by El-degwy, Hossam, Kelash, Hamdy M., Faragallah, Osama S.

    ISBN: 9781467355650, 1467355658
    Published: IEEE 01.12.2012
    “…In this paper, we propose a solution which can not only satisfy security demands like confidentiality and integrity for data carried during e-transaction, but…”
    Get full text
    Conference Proceeding
  14. 14

    Two Improved Algorithms Based on Character Encryption and Decryption by Ze-mao Zhao, Meng-ting Li

    ISBN: 1424482313, 9781424482313
    Published: IEEE 01.07.2010
    “…To improve the weakness that the same plaintext strings have the same ciphertext strings in character encryption and decryption scheme based on a shift…”
    Get full text
    Conference Proceeding
  15. 15

    Quantum Image Encryption and Decryption Algorithms Based on Quantum Image Geometric Transformations by Zhou, Ri-Gui, Wu, Qian, Zhang, Man-Qun, Shen, Chen-Yi

    ISSN: 0020-7748, 1572-9575
    Published: Boston Springer US 01.06.2013
    “…Cryptography is the essential subject for network information security to protect important data. Although following the symmetric cryptosystem for which the…”
    Get full text
    Journal Article
  16. 16

    Speed Up Image Encryption by Using RSA Algorithm by Al-Kadei, Faten H. Mohammed Sediq, Mardan, Huda Abdalkaream, Minas, Nevart A.

    ISBN: 1728151961, 9781728151960
    ISSN: 2575-7288
    Published: IEEE 01.03.2020
    “…Since the existing RSA Algorithm needs long key sizes, requires big memory spaces and also a long execution time, it seems necessary to make some changes or…”
    Get full text
    Conference Proceeding
  17. 17

    Three Diamentional Object Used for Data Security by Mhaske-Dhamdhere, V, Patil, G A

    ISBN: 142448653X, 9781424486533
    Published: IEEE 01.11.2010
    “…Current authentication systems suffer from many weaknesses. Textual passwords are commonly used, however, users do not follow their requirements. Users tend to…”
    Get full text
    Conference Proceeding