Search Results - Encryption/decryption algorithm
-
1
QR code-based ECG signal encryption/decryption algorithm
ISSN: 0161-1194, 1558-1586Published: West Point Taylor & Francis 04.05.2019Published in Cryptologia (04.05.2019)“…The paper presents a novel and enhanced bio-signal (ECG) cryptographic technique in which a QR code has been successfully utilized as a data container. The…”
Get full text
Journal Article -
2
A Fast Text-to-Image Encryption-Decryption Algorithm for Secure Network Communication
ISSN: 2073-431X, 2073-431XPublished: Basel MDPI AG 01.03.2022Published in Computers (Basel) (01.03.2022)“… In this paper, a Text-to-Image Encryption-Decryption (TTIED) algorithm based on Cyan, Magenta, Yellow, Key/Black (CMYK…”
Get full text
Journal Article -
3
RL-BLED: A Reversible Logic Design of Bit Level Encryption/Decryption Algorithm for Secure Mammogram Data Transmission
ISSN: 0929-6212, 1572-834XPublished: New York Springer US 01.07.2022Published in Wireless personal communications (01.07.2022)“… The image encryption algorithms that considered bit-level permutation can provide better security by changing the position of the pixels concurrently…”
Get full text
Journal Article -
4
Distributed Economic Dispatch of Microgrids Based on ADMM Algorithms With Encryption-Decryption Rules
ISSN: 1545-5955, 1558-3783Published: IEEE 01.01.2025Published in IEEE transactions on automation science and engineering (01.01.2025)“…), where a quantization-based encryption and decryption rule is integrated to avoid privacy leakage while iteratively acquiring the optimal ED scheme…”
Get full text
Journal Article -
5
A 4-D HyperChaotic DNA Encryption/Decryption Algorithm for Securing Students Data System
ISSN: 2310-9025, 2310-9033Published: 08.10.2022Published in International Journal of Mathematical Sciences and Computing (08.10.2022)Get full text
Journal Article -
6
Event‐based privacy‐preserving security consensus of multi‐agent systems with encryption–decryption mechanism
ISSN: 1049-8923, 1099-1239Published: Bognor Regis Wiley Subscription Services, Inc 10.05.2024Published in International journal of robust and nonlinear control (10.05.2024)“… An encryption and decryption algorithm has been proposed to address data security and privacy issues during data transmission…”
Get full text
Journal Article -
7
Image based Steganography in Cryptography implementing different Encryption-Decryption Algorithm
ISSN: 2456-3307, 2456-3307Published: 20.07.2020Published in International Journal of Scientific Research in Computer Science, Engineering and Information Technology (20.07.2020)“…Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-secure method in which…”
Get full text
Journal Article -
8
10 Clock-Periods Pipelined Implementation of AES-128 Encryption-Decryption Algorithm up to 28 Gbit/s Real Throughput by Xilinx Zynq UltraScale+ MPSoC ZCU102 Platform
ISSN: 2079-9292, 2079-9292Published: Basel MDPI AG 01.10.2020Published in Electronics (Basel) (01.10.2020)“…; a Xilinx ZCU102 Field Programmable Gate Array (FPGA) platform represents the core of this communication system since manages all the base-band operations, including the encryption/decryption of the data…”
Get full text
Journal Article -
9
Real-Time Encryption/Decryption Algorithm with A Fractional Chaotic System of Various Data: Image, Speech, and Text
ISSN: 2349-5103, 2199-5796Published: New Delhi Springer India 01.08.2022Published in International journal of applied and computational mathematics (01.08.2022)“… to initial conditions and their unpredictability. This paper proposed an encryption-decryption of image, sound, and text data based on fractional-order Rössler chaotic system. Firstly Master…”
Get full text
Journal Article -
10
Encryption-Decryption-Based Bipartite Synchronization of Markov Jump Coupled Neural Networks: An Event-Triggered Mechanism
ISSN: 2327-4662, 2327-4662Published: IEEE 2025Published in IEEE internet of things journal (2025)“… Moreover, an encryption-decryption algorithm that takes into account identity authentication is programmed to encrypt the data at the triggering moment of each node…”
Get full text
Journal Article -
11
A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography
ISSN: 0045-7906, 1879-0755Published: Elsevier Ltd 01.09.2022Published in Computers & electrical engineering (01.09.2022)“…, "Efficient Algorithm for Secure Transmission (EAST)," integrating encryption and steganography algorithms…”
Get full text
Journal Article -
12
Edge-event-triggered encryption-decryption observer-based control of multiagent systems for privacy protection under multiple cyber attacks
ISSN: 0020-0255, 1872-6291Published: Elsevier Inc 01.09.2023Published in Information sciences (01.09.2023)“…) under undirected topology and multiple cyber attacks. An observer-based dynamic cryptography-based encryption-decryption (CED…”
Get full text
Journal Article -
13
Event-based privacy-consensus control for multiagent systems: An enhanced framework for fault-tolerance and protection against eavesdropping
ISSN: 0096-3003Published: Elsevier Inc 01.09.2025Published in Applied mathematics and computation (01.09.2025)“… Furthermore, an intermittent event-triggered mechanism (ETM) is introduced to mitigate the computational and communication burdens imposed by the encoding algorithms…”
Get full text
Journal Article -
14
VLSI Implementation of RSA Encryption/Decryption Algorithm
ISSN: 2347-2227, 2347-6141Published: Nagercoil iManager Publications 15.05.2014Published in I-Manager's Journal on Computer Science (15.05.2014)“…The RSA system is widely employed in networking applications for good performance and high security. It supports the multiple key sizes like 128 bits, 256…”
Get full text
Journal Article -
15
A low-cost and highly compact FPGA-based encryption/decryption architecture for AES algorithm
ISSN: 1548-0992, 1548-0992Published: Los Alamitos IEEE 01.09.2021Published in Revista IEEE América Latina (01.09.2021)“… However, the area consumption is still a factor to be improved. In this paper, a highly compact encryption/decryption architecture, which is implemented in a low-cost FPGA, to efficiently simulate the AES algorithm, is proposed…”
Get full text
Journal Article -
16
A dynamic encryption–decryption scheme for replay attack detection in cyber–physical systems
ISSN: 0005-1098, 1873-2836Published: Elsevier Ltd 01.05.2023Published in Automatica (Oxford) (01.05.2023)“…This paper deals with the replay attack detection problem for a class of cyber–physical systems. A dynamic encryption…”
Get full text
Journal Article -
17
Algebraic Coding Theory Using Pell Equation x2 − 8y2 = 1
ISSN: 1592-7415, 2282-8214Published: Pescara Accademia Piceno Aprutina dei Velati in Teramo (APAV) 01.03.2023Published in Ratio mathematica (01.03.2023)“…An interdisciplinary field with significant practical use is cryptography. The difficulty of specific mathematical computing tasks affects a public key…”
Get full text
Journal Article -
18
Design of Event-Triggered Secure Containment Controllers for Multi-Agent Systems over Signed Graphs
ISSN: 0278-081X, 1531-5878Published: New York Springer US 01.06.2025Published in Circuits, systems, and signal processing (01.06.2025)“… On one hand, an encryption-decryption algorithm is proposed to improve data security and reliability…”
Get full text
Journal Article -
19
Quantized Distributed Economic Dispatch for Microgrids: Paillier Encryption-Decryption Scheme
ISSN: 1551-3203, 1941-0050Published: Piscataway IEEE 01.04.2024Published in IEEE transactions on industrial informatics (01.04.2024)“… A quantized distributed optimization algorithm using the Paillier encryption-decryption scheme is developed…”
Get full text
Journal Article -
20
Word-based encryption algorithm using dictionary indexing with variable encryption key length
ISSN: 2088-8708, 2722-2578, 2088-8708Published: Yogyakarta IAES Institute of Advanced Engineering and Science 01.02.2022Published in International journal of electrical and computer engineering (Malacca, Malacca) (01.02.2022)“…This paper proposes a new algorithm for text encryption utilizing English words as a unit of encoding…”
Get full text
Journal Article