Search Results - Encryption/decryption algorithm

Refine Results
  1. 1

    QR code-based ECG signal encryption/decryption algorithm by Mathivanan, P., Ganesh, A. Balaji, Venkatesan, R.

    ISSN: 0161-1194, 1558-1586
    Published: West Point Taylor & Francis 04.05.2019
    Published in Cryptologia (04.05.2019)
    “…The paper presents a novel and enhanced bio-signal (ECG) cryptographic technique in which a QR code has been successfully utilized as a data container. The…”
    Get full text
    Journal Article
  2. 2

    A Fast Text-to-Image Encryption-Decryption Algorithm for Secure Network Communication by Noor, Noor Sattar, Hammood, Dalal Abdulmohsin, Al-Naji, Ali, Chahl, Javaan

    ISSN: 2073-431X, 2073-431X
    Published: Basel MDPI AG 01.03.2022
    Published in Computers (Basel) (01.03.2022)
    “… In this paper, a Text-to-Image Encryption-Decryption (TTIED) algorithm based on Cyan, Magenta, Yellow, Key/Black (CMYK…”
    Get full text
    Journal Article
  3. 3

    RL-BLED: A Reversible Logic Design of Bit Level Encryption/Decryption Algorithm for Secure Mammogram Data Transmission by Guptha, M. N. Sharada, Eshwarappa, M. N.

    ISSN: 0929-6212, 1572-834X
    Published: New York Springer US 01.07.2022
    Published in Wireless personal communications (01.07.2022)
    “… The image encryption algorithms that considered bit-level permutation can provide better security by changing the position of the pixels concurrently…”
    Get full text
    Journal Article
  4. 4

    Distributed Economic Dispatch of Microgrids Based on ADMM Algorithms With Encryption-Decryption Rules by Sun, Lei, Ding, Derui, Dong, Hongli, Yi, Xiaojian

    ISSN: 1545-5955, 1558-3783
    Published: IEEE 01.01.2025
    “…), where a quantization-based encryption and decryption rule is integrated to avoid privacy leakage while iteratively acquiring the optimal ED scheme…”
    Get full text
    Journal Article
  5. 5
  6. 6

    Event‐based privacy‐preserving security consensus of multi‐agent systems with encryptiondecryption mechanism by Liu, Jinliang, Deng, Ying, Zha, Lijuan, Xie, Xiangpeng, Tian, Engang

    ISSN: 1049-8923, 1099-1239
    Published: Bognor Regis Wiley Subscription Services, Inc 10.05.2024
    “… An encryption and decryption algorithm has been proposed to address data security and privacy issues during data transmission…”
    Get full text
    Journal Article
  7. 7

    Image based Steganography in Cryptography implementing different Encryption-Decryption Algorithm by Dutta, Pinky Saikia, Chakraborty, Sauvik

    ISSN: 2456-3307, 2456-3307
    Published: 20.07.2020
    “…Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-secure method in which…”
    Get full text
    Journal Article
  8. 8

    10 Clock-Periods Pipelined Implementation of AES-128 Encryption-Decryption Algorithm up to 28 Gbit/s Real Throughput by Xilinx Zynq UltraScale+ MPSoC ZCU102 Platform by Visconti, Paolo, Capoccia, Stefano, Venere, Eugenio, Velázquez, Ramiro, Fazio, Roberto de

    ISSN: 2079-9292, 2079-9292
    Published: Basel MDPI AG 01.10.2020
    Published in Electronics (Basel) (01.10.2020)
    “…; a Xilinx ZCU102 Field Programmable Gate Array (FPGA) platform represents the core of this communication system since manages all the base-band operations, including the encryption/decryption of the data…”
    Get full text
    Journal Article
  9. 9

    Real-Time Encryption/Decryption Algorithm with A Fractional Chaotic System of Various Data: Image, Speech, and Text by Ataş, Muhammet Taha, Güler, Hasan

    ISSN: 2349-5103, 2199-5796
    Published: New Delhi Springer India 01.08.2022
    “… to initial conditions and their unpredictability. This paper proposed an encryption-decryption of image, sound, and text data based on fractional-order Rössler chaotic system. Firstly Master…”
    Get full text
    Journal Article
  10. 10

    Encryption-Decryption-Based Bipartite Synchronization of Markov Jump Coupled Neural Networks: An Event-Triggered Mechanism by Shi, Liangyao, Wang, Jing, Yan, Huaicheng, Cao, Jinde, Shen, Hao

    ISSN: 2327-4662, 2327-4662
    Published: IEEE 2025
    Published in IEEE internet of things journal (2025)
    “… Moreover, an encryption-decryption algorithm that takes into account identity authentication is programmed to encrypt the data at the triggering moment of each node…”
    Get full text
    Journal Article
  11. 11

    A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography by Rathore, Manjari Singh, Poongodi, M., Saurabh, Praneet, Lilhore, Umesh Kumar, Bourouis, Sami, Alhakami, Wajdi, Osamor, Jude, Hamdi, Mounir

    ISSN: 0045-7906, 1879-0755
    Published: Elsevier Ltd 01.09.2022
    Published in Computers & electrical engineering (01.09.2022)
    “…, "Efficient Algorithm for Secure Transmission (EAST)," integrating encryption and steganography algorithms…”
    Get full text
    Journal Article
  12. 12

    Edge-event-triggered encryption-decryption observer-based control of multiagent systems for privacy protection under multiple cyber attacks by Guo, Xiang-Gui, Wang, Bo-Qun, Wang, Jian-Liang, Ahn, Choon Ki, Wu, Zheng-Guang

    ISSN: 0020-0255, 1872-6291
    Published: Elsevier Inc 01.09.2023
    Published in Information sciences (01.09.2023)
    “…) under undirected topology and multiple cyber attacks. An observer-based dynamic cryptography-based encryption-decryption (CED…”
    Get full text
    Journal Article
  13. 13

    Event-based privacy-consensus control for multiagent systems: An enhanced framework for fault-tolerance and protection against eavesdropping by Hu, Xiaoyan, Ye, Dan

    ISSN: 0096-3003
    Published: Elsevier Inc 01.09.2025
    Published in Applied mathematics and computation (01.09.2025)
    “… Furthermore, an intermittent event-triggered mechanism (ETM) is introduced to mitigate the computational and communication burdens imposed by the encoding algorithms…”
    Get full text
    Journal Article
  14. 14

    VLSI Implementation of RSA Encryption/Decryption Algorithm by R, Rasu, ., Manoshrudhy, Shanmugasundaram, P.

    ISSN: 2347-2227, 2347-6141
    Published: Nagercoil iManager Publications 15.05.2014
    Published in I-Manager's Journal on Computer Science (15.05.2014)
    “…The RSA system is widely employed in networking applications for good performance and high security. It supports the multiple key sizes like 128 bits, 256…”
    Get full text
    Journal Article
  15. 15

    A low-cost and highly compact FPGA-based encryption/decryption architecture for AES algorithm by Equihua, Christian, Anides, Esteban, Garcia, Jorge Luis, Vazquez, Eduardo, Sanchez, Gabriel, Avalos, Juan-Gerardo, Sanchez, Giovanny

    ISSN: 1548-0992, 1548-0992
    Published: Los Alamitos IEEE 01.09.2021
    Published in Revista IEEE América Latina (01.09.2021)
    “… However, the area consumption is still a factor to be improved. In this paper, a highly compact encryption/decryption architecture, which is implemented in a low-cost FPGA, to efficiently simulate the AES algorithm, is proposed…”
    Get full text
    Journal Article
  16. 16

    A dynamic encryptiondecryption scheme for replay attack detection in cyber–physical systems by Li, Tongxiang, Wang, Zidong, Zou, Lei, Chen, Bo, Yu, Li

    ISSN: 0005-1098, 1873-2836
    Published: Elsevier Ltd 01.05.2023
    Published in Automatica (Oxford) (01.05.2023)
    “…This paper deals with the replay attack detection problem for a class of cyber–physical systems. A dynamic encryption…”
    Get full text
    Journal Article
  17. 17

    Algebraic Coding Theory Using Pell Equation x2 − 8y2 = 1 by Janaki, G, Gowri, Shankari A

    ISSN: 1592-7415, 2282-8214
    Published: Pescara Accademia Piceno Aprutina dei Velati in Teramo (APAV) 01.03.2023
    Published in Ratio mathematica (01.03.2023)
    “…An interdisciplinary field with significant practical use is cryptography. The difficulty of specific mathematical computing tasks affects a public key…”
    Get full text
    Journal Article
  18. 18

    Design of Event-Triggered Secure Containment Controllers for Multi-Agent Systems over Signed Graphs by Zheng, Shaobo, Zhou, Lei

    ISSN: 0278-081X, 1531-5878
    Published: New York Springer US 01.06.2025
    Published in Circuits, systems, and signal processing (01.06.2025)
    “… On one hand, an encryption-decryption algorithm is proposed to improve data security and reliability…”
    Get full text
    Journal Article
  19. 19

    Quantized Distributed Economic Dispatch for Microgrids: Paillier Encryption-Decryption Scheme by Chen, Wei, Wang, Zidong, Ge, Quanbo, Dong, Hongli, Liu, Guo-Ping

    ISSN: 1551-3203, 1941-0050
    Published: Piscataway IEEE 01.04.2024
    “… A quantized distributed optimization algorithm using the Paillier encryption-decryption scheme is developed…”
    Get full text
    Journal Article
  20. 20

    Word-based encryption algorithm using dictionary indexing with variable encryption key length by Al-Jarrah, Ahmad, Albsharat, Amer, Al-Jarrah, Mohammad

    ISSN: 2088-8708, 2722-2578, 2088-8708
    Published: Yogyakarta IAES Institute of Advanced Engineering and Science 01.02.2022
    “…This paper proposes a new algorithm for text encryption utilizing English words as a unit of encoding…”
    Get full text
    Journal Article