Search Results - "Encryption-decryption algorithm"

Refine Results
  1. 1

    QR code-based ECG signal encryption/decryption algorithm by Mathivanan, P., Ganesh, A. Balaji, Venkatesan, R.

    ISSN: 0161-1194, 1558-1586
    Published: West Point Taylor & Francis 04.05.2019
    Published in Cryptologia (04.05.2019)
    “…The paper presents a novel and enhanced bio-signal (ECG) cryptographic technique in which a QR code has been successfully utilized as a data container. The…”
    Get full text
    Journal Article
  2. 2

    A Fast Text-to-Image Encryption-Decryption Algorithm for Secure Network Communication by Noor, Noor Sattar, Hammood, Dalal Abdulmohsin, Al-Naji, Ali, Chahl, Javaan

    ISSN: 2073-431X, 2073-431X
    Published: Basel MDPI AG 01.03.2022
    Published in Computers (Basel) (01.03.2022)
    “…Data security is the science of protecting data in information technology, including authentication, data encryption, data decryption, data recovery, and user…”
    Get full text
    Journal Article
  3. 3

    RL-BLED: A Reversible Logic Design of Bit Level Encryption/Decryption Algorithm for Secure Mammogram Data Transmission by Guptha, M. N. Sharada, Eshwarappa, M. N.

    ISSN: 0929-6212, 1572-834X
    Published: New York Springer US 01.07.2022
    Published in Wireless personal communications (01.07.2022)
    “…Security is an essential task while focusing on confidential level of patient information during medical data transmission. The image encryption algorithms…”
    Get full text
    Journal Article
  4. 4
  5. 5

    Image based Steganography in Cryptography implementing different Encryption-Decryption Algorithm by Dutta, Pinky Saikia, Chakraborty, Sauvik

    ISSN: 2456-3307, 2456-3307
    Published: 20.07.2020
    “…Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-secure method in which…”
    Get full text
    Journal Article
  6. 6

    10 Clock-Periods Pipelined Implementation of AES-128 Encryption-Decryption Algorithm up to 28 Gbit/s Real Throughput by Xilinx Zynq UltraScale+ MPSoC ZCU102 Platform by Visconti, Paolo, Capoccia, Stefano, Venere, Eugenio, Velázquez, Ramiro, Fazio, Roberto de

    ISSN: 2079-9292, 2079-9292
    Published: Basel MDPI AG 01.10.2020
    Published in Electronics (Basel) (01.10.2020)
    “…The security of communication and computer systems is an increasingly important issue, nowadays pervading all areas of human activity (e.g., credit cards,…”
    Get full text
    Journal Article
  7. 7

    Real-Time Encryption/Decryption Algorithm with A Fractional Chaotic System of Various Data: Image, Speech, and Text by Ataş, Muhammet Taha, Güler, Hasan

    ISSN: 2349-5103, 2199-5796
    Published: New Delhi Springer India 01.08.2022
    “…Nowadays, a fractional-order chaotic system is commonly used in digital cryptosystem applications due to its precision to initial conditions and their…”
    Get full text
    Journal Article
  8. 8

    A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography by Rathore, Manjari Singh, Poongodi, M., Saurabh, Praneet, Lilhore, Umesh Kumar, Bourouis, Sami, Alhakami, Wajdi, Osamor, Jude, Hamdi, Mounir

    ISSN: 0045-7906, 1879-0755
    Published: Elsevier Ltd 01.09.2022
    Published in Computers & electrical engineering (01.09.2022)
    “…•This research emphasizes enhancing data security in real-time IoV communication considering secure communication also presents a trust-driven privacy method…”
    Get full text
    Journal Article
  9. 9

    Event-based privacy-consensus control for multiagent systems: An enhanced framework for fault-tolerance and protection against eavesdropping by Hu, Xiaoyan, Ye, Dan

    ISSN: 0096-3003
    Published: Elsevier Inc 01.09.2025
    Published in Applied mathematics and computation (01.09.2025)
    “…This paper investigates the consensus problem of privacy protection for multi-agent systems (MASs) under conditions of compound faults. We develop a…”
    Get full text
    Journal Article
  10. 10

    VLSI Implementation of RSA Encryption/Decryption Algorithm by R, Rasu, ., Manoshrudhy, Shanmugasundaram, P.

    ISSN: 2347-2227, 2347-6141
    Published: Nagercoil iManager Publications 15.05.2014
    Published in I-Manager's Journal on Computer Science (15.05.2014)
    “…The RSA system is widely employed in networking applications for good performance and high security. It supports the multiple key sizes like 128 bits, 256…”
    Get full text
    Journal Article
  11. 11

    Algebraic Coding Theory Using Pell Equation x2 − 8y2 = 1 by Janaki, G, Gowri, Shankari A

    ISSN: 1592-7415, 2282-8214
    Published: Pescara Accademia Piceno Aprutina dei Velati in Teramo (APAV) 01.03.2023
    Published in Ratio mathematica (01.03.2023)
    “…An interdisciplinary field with significant practical use is cryptography. The difficulty of specific mathematical computing tasks affects a public key…”
    Get full text
    Journal Article
  12. 12

    Design of Event-Triggered Secure Containment Controllers for Multi-Agent Systems over Signed Graphs by Zheng, Shaobo, Zhou, Lei

    ISSN: 0278-081X, 1531-5878
    Published: New York Springer US 01.06.2025
    Published in Circuits, systems, and signal processing (01.06.2025)
    “… On one hand, an encryption-decryption algorithm is proposed to improve data security and reliability…”
    Get full text
    Journal Article
  13. 13

    Encryption-Decryption-Based Bipartite Synchronization of Markov Jump Coupled Neural Networks: An Event-Triggered Mechanism by Shi, Liangyao, Wang, Jing, Yan, Huaicheng, Cao, Jinde, Shen, Hao

    ISSN: 2327-4662, 2327-4662
    Published: IEEE 2025
    Published in IEEE internet of things journal (2025)
    “… Moreover, an encryption-decryption algorithm that takes into account identity authentication is programmed to encrypt the data at the triggering moment of each node…”
    Get full text
    Journal Article
  14. 14

    Word-based encryption algorithm using dictionary indexing with variable encryption key length by Al-Jarrah, Ahmad, Albsharat, Amer, Al-Jarrah, Mohammad

    ISSN: 2088-8708, 2722-2578, 2088-8708
    Published: Yogyakarta IAES Institute of Advanced Engineering and Science 01.02.2022
    “…This paper proposes a new algorithm for text encryption utilizing English words as a unit of encoding. The algorithm vanishes any feature that could be used to…”
    Get full text
    Journal Article
  15. 15

    An Efficient ASIC Implementation of CLEFIA Encryption/Decryption Algorithm With Novel S-Box Architectures by Saravanan, P., Rani, S. Subha, Rekha, S. Shanthi, Jatana, H.S.

    Published: IEEE 01.07.2019
    “…The demand for lightweight cryptography is inevitable considering the need for security and privacy in the resource constrained environment like active smart…”
    Get full text
    Conference Proceeding
  16. 16

    Self-Synchronizing Mode of Operation for an Encryption/Decryption Algorithm

    Published: Washington, D.C Targeted News Service 09.01.2024
    Published in Targeted News Service (09.01.2024)
    Get full text
    Newsletter
  17. 17

    A MESSAGE CRYPTOGRAPHY TECHNIQUE USING DNA BASED HYBRID APPROACH by Godbole, Vaibhav

    ISSN: 1985-6571
    Published: Kajang Science & Technology Research Institute for Defence (STRIDE) 01.01.2019
    Published in Defence S&T Technical Bulletin (01.01.2019)
    “…Cryptography makes the transmitted message unreadable to unauthorised users. DNA cryptography is being explored worldwide and even in being in its primitive…”
    Get full text
    Journal Article
  18. 18
  19. 19
  20. 20

    A Coding Algorithm using Super-edge Magic Total Labeling of Extended Duplicate Graphs by Jegan, R., Vijayakumar, P., Thirusangu, K.

    Published: IEEE 08.09.2022
    “…Graph labeling has wide applications in the field of radio astronomy, computer networks, communication networks and cryptography etc. Encoding is a technique…”
    Get full text
    Conference Proceeding