Search Results - "Encryption-decryption algorithm"
-
1
QR code-based ECG signal encryption/decryption algorithm
ISSN: 0161-1194, 1558-1586Published: West Point Taylor & Francis 04.05.2019Published in Cryptologia (04.05.2019)“…The paper presents a novel and enhanced bio-signal (ECG) cryptographic technique in which a QR code has been successfully utilized as a data container. The…”
Get full text
Journal Article -
2
A Fast Text-to-Image Encryption-Decryption Algorithm for Secure Network Communication
ISSN: 2073-431X, 2073-431XPublished: Basel MDPI AG 01.03.2022Published in Computers (Basel) (01.03.2022)“…Data security is the science of protecting data in information technology, including authentication, data encryption, data decryption, data recovery, and user…”
Get full text
Journal Article -
3
RL-BLED: A Reversible Logic Design of Bit Level Encryption/Decryption Algorithm for Secure Mammogram Data Transmission
ISSN: 0929-6212, 1572-834XPublished: New York Springer US 01.07.2022Published in Wireless personal communications (01.07.2022)“…Security is an essential task while focusing on confidential level of patient information during medical data transmission. The image encryption algorithms…”
Get full text
Journal Article -
4
A 4-D HyperChaotic DNA Encryption/Decryption Algorithm for Securing Students Data System
ISSN: 2310-9025, 2310-9033Published: 08.10.2022Published in International Journal of Mathematical Sciences and Computing (08.10.2022)Get full text
Journal Article -
5
Image based Steganography in Cryptography implementing different Encryption-Decryption Algorithm
ISSN: 2456-3307, 2456-3307Published: 20.07.2020Published in International Journal of Scientific Research in Computer Science, Engineering and Information Technology (20.07.2020)“…Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-secure method in which…”
Get full text
Journal Article -
6
10 Clock-Periods Pipelined Implementation of AES-128 Encryption-Decryption Algorithm up to 28 Gbit/s Real Throughput by Xilinx Zynq UltraScale+ MPSoC ZCU102 Platform
ISSN: 2079-9292, 2079-9292Published: Basel MDPI AG 01.10.2020Published in Electronics (Basel) (01.10.2020)“…The security of communication and computer systems is an increasingly important issue, nowadays pervading all areas of human activity (e.g., credit cards,…”
Get full text
Journal Article -
7
Real-Time Encryption/Decryption Algorithm with A Fractional Chaotic System of Various Data: Image, Speech, and Text
ISSN: 2349-5103, 2199-5796Published: New Delhi Springer India 01.08.2022Published in International journal of applied and computational mathematics (01.08.2022)“…Nowadays, a fractional-order chaotic system is commonly used in digital cryptosystem applications due to its precision to initial conditions and their…”
Get full text
Journal Article -
8
A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography
ISSN: 0045-7906, 1879-0755Published: Elsevier Ltd 01.09.2022Published in Computers & electrical engineering (01.09.2022)“…•This research emphasizes enhancing data security in real-time IoV communication considering secure communication also presents a trust-driven privacy method…”
Get full text
Journal Article -
9
Event-based privacy-consensus control for multiagent systems: An enhanced framework for fault-tolerance and protection against eavesdropping
ISSN: 0096-3003Published: Elsevier Inc 01.09.2025Published in Applied mathematics and computation (01.09.2025)“…This paper investigates the consensus problem of privacy protection for multi-agent systems (MASs) under conditions of compound faults. We develop a…”
Get full text
Journal Article -
10
VLSI Implementation of RSA Encryption/Decryption Algorithm
ISSN: 2347-2227, 2347-6141Published: Nagercoil iManager Publications 15.05.2014Published in I-Manager's Journal on Computer Science (15.05.2014)“…The RSA system is widely employed in networking applications for good performance and high security. It supports the multiple key sizes like 128 bits, 256…”
Get full text
Journal Article -
11
Algebraic Coding Theory Using Pell Equation x2 − 8y2 = 1
ISSN: 1592-7415, 2282-8214Published: Pescara Accademia Piceno Aprutina dei Velati in Teramo (APAV) 01.03.2023Published in Ratio mathematica (01.03.2023)“…An interdisciplinary field with significant practical use is cryptography. The difficulty of specific mathematical computing tasks affects a public key…”
Get full text
Journal Article -
12
Design of Event-Triggered Secure Containment Controllers for Multi-Agent Systems over Signed Graphs
ISSN: 0278-081X, 1531-5878Published: New York Springer US 01.06.2025Published in Circuits, systems, and signal processing (01.06.2025)“… On one hand, an encryption-decryption algorithm is proposed to improve data security and reliability…”
Get full text
Journal Article -
13
Encryption-Decryption-Based Bipartite Synchronization of Markov Jump Coupled Neural Networks: An Event-Triggered Mechanism
ISSN: 2327-4662, 2327-4662Published: IEEE 2025Published in IEEE internet of things journal (2025)“… Moreover, an encryption-decryption algorithm that takes into account identity authentication is programmed to encrypt the data at the triggering moment of each node…”
Get full text
Journal Article -
14
Word-based encryption algorithm using dictionary indexing with variable encryption key length
ISSN: 2088-8708, 2722-2578, 2088-8708Published: Yogyakarta IAES Institute of Advanced Engineering and Science 01.02.2022Published in International journal of electrical and computer engineering (Malacca, Malacca) (01.02.2022)“…This paper proposes a new algorithm for text encryption utilizing English words as a unit of encoding. The algorithm vanishes any feature that could be used to…”
Get full text
Journal Article -
15
An Efficient ASIC Implementation of CLEFIA Encryption/Decryption Algorithm With Novel S-Box Architectures
Published: IEEE 01.07.2019Published in 2019 IEEE 1st International Conference on Energy, Systems and Information Processing (ICESIP) (01.07.2019)“…The demand for lightweight cryptography is inevitable considering the need for security and privacy in the resource constrained environment like active smart…”
Get full text
Conference Proceeding -
16
Self-Synchronizing Mode of Operation for an Encryption/Decryption Algorithm
Published: Washington, D.C Targeted News Service 09.01.2024Published in Targeted News Service (09.01.2024)Get full text
Newsletter -
17
A MESSAGE CRYPTOGRAPHY TECHNIQUE USING DNA BASED HYBRID APPROACH
ISSN: 1985-6571Published: Kajang Science & Technology Research Institute for Defence (STRIDE) 01.01.2019Published in Defence S&T Technical Bulletin (01.01.2019)“…Cryptography makes the transmitted message unreadable to unauthorised users. DNA cryptography is being explored worldwide and even in being in its primitive…”
Get full text
Journal Article -
18
US Patent Issued to HARRIS GLOBAL COMMUNICATIONS on Jan. 9 for "Self-synchronizing mode of operation for an encryption/decryption algorithm" (New York Inventors)
Published: Washington, D.C HT Digital Streams Limited 10.01.2024Published in US Fed News Service, Including US State News (10.01.2024)Get full text
Newsletter -
19
US Patent Issued to HARRIS SOLUTIONS NY on May 26 for "Customizable encryption/decryption algorithm" (New York, Maryland Inventors)
Published: Washington, D.C HT Digital Streams Limited 27.05.2020Published in US Fed News Service, Including US State News (27.05.2020)Get full text
Newsletter -
20
A Coding Algorithm using Super-edge Magic Total Labeling of Extended Duplicate Graphs
Published: IEEE 08.09.2022Published in 2022 Second International Conference on Computer Science, Engineering and Applications (ICCSEA) (08.09.2022)“…Graph labeling has wide applications in the field of radio astronomy, computer networks, communication networks and cryptography etc. Encoding is a technique…”
Get full text
Conference Proceeding