Suchergebnisse - RSA encryption-decryption algorithm
Andere Suchmöglichkeiten:
- RSA encryption-decryption algorithm »
-
1
VLSI Implementation of RSA Encryption/Decryption Algorithm
ISSN: 2347-2227, 2347-6141Veröffentlicht: Nagercoil iManager Publications 15.05.2014Veröffentlicht in I-Manager's Journal on Computer Science (15.05.2014)“… The RSA system is widely employed in networking applications for good performance and high security …”
Volltext
Journal Article -
2
Performance Comparison between RSA and El-Gamal Algorithms for Speech Data Encryption and Decryption
ISSN: 1999-8716, 2616-6909Veröffentlicht: University of Diyala 01.03.2023Veröffentlicht in DIYALA JOURNAL OF ENGINEERING SCIENCES (01.03.2023)“… This article presents a performance comparison of two known public key cryptography techniques namely RSA (Rivest–Shamir–Adleman …”
Volltext
Journal Article -
3
A Coding Algorithm using Super-edge Magic Total Labeling of Extended Duplicate Graphs
Veröffentlicht: IEEE 08.09.2022Veröffentlicht in 2022 Second International Conference on Computer Science, Engineering and Applications (ICCSEA) (08.09.2022)“… In this paper, encoding and decoding algorithms sandwiching super-edge magic total labeling algorithms, super-edge antimagic total labeling and algorithms like affine-cipher and RSA algorithms …”
Volltext
Tagungsbericht -
4
The Implementation of the 1024-bit RSA Encryption/Decryption Algorithms Based on FPGA
ISBN: 9525726045, 9789525726046Veröffentlicht: Oulu Academy Publisher 01.01.2009Veröffentlicht in Proceedings. The 2009 International Symposium on Intelligent Information Systems and Applications (IISA 2009) (01.01.2009)Volltext
Tagungsbericht -
5
Modified RSA Using Triple Keys Based Encryption/Decryption
ISSN: 2409-9600Veröffentlicht: 01.03.2021Veröffentlicht in Jordan Journal of Electrical Engineering (01.03.2021)Volltext
Journal Article -
6
An Approach towards an Efficient Encryption-Decryption of Grayscale and Color Images
ISSN: 1877-0509, 1877-0509Veröffentlicht: Elsevier B.V 2019Veröffentlicht in Procedia computer science (2019)“… The paper considers a new, authors-developed approach to encryption-decryption of grayscale and color images, which is based on the RSA algorithm …”
Volltext
Journal Article -
7
An efficient hardware model for RSA Encryption system using Vedic mathematics
ISSN: 1877-7058, 1877-7058Veröffentlicht: Elsevier Ltd 2012Veröffentlicht in Procedia engineering (2012)“… The standard techniques for providing privacy and security in data networks include encryption/decryption algorithms such as Advanced Encryption System (AES) (private-key) and RSA (public-key …”
Volltext
Journal Article -
8
Real-Time Encryption/Decryption of Audio Signal
ISSN: 2074-9090, 2074-9104Veröffentlicht: Hong Kong Modern Education and Computer Science Press 08.02.2016Veröffentlicht in International journal of computer network and information security (08.02.2016)“… The current paper applies and evaluate two different encryption/decryption algorithms to the real-time audio signal …”
Volltext
Journal Article -
9
Increase Security of Li-Fi Technology by Using RSA Algorithm to Encryption and Decryption Important Data
ISSN: 2710-2165, 2710-2165Veröffentlicht: Al-Iraqia University - College of Engineering 01.12.2024Veröffentlicht in Al-Iraqia Journal for Scientific Engineering Research (01.12.2024)“… RSA technology to encrypt data and, transmit it over the network and then decrypt it at the receiving end. This approach has shown positive results with the use of large prime numbers with a high level of resistance to hacking and decryption, ensuring the secure flow of network data …”
Volltext
Journal Article -
10
A secure IoT based healthcare framework using modified RSA algorithm using an artificial hummingbird based CNN
ISSN: 2161-3915, 2161-3915Veröffentlicht: Chichester, UK John Wiley & Sons, Ltd 01.12.2022Veröffentlicht in Transactions on emerging telecommunications technologies (01.12.2022)“… Recently, a wide variety of real‐world problems are solved via cloud computing, deep learning, machine learning, artificial intelligence, and the Internet of …”
Volltext
Journal Article -
11
A BRIEF OVERVIEW OF CRYPTOGRAPHIC TECHNIQUES: ENCRYPTION, DECRYPTION, RSA AND MORE
ISSN: 2582-7472, 2582-7472Veröffentlicht: 30.06.2024Veröffentlicht in ShodhKosh: Journal of Visual and Performing Arts (30.06.2024)“… Communication plays a crucial role in today’s information age, with the advancement of new technologies, altogether making security a vital consideration. In …”
Volltext
Journal Article -
12
Image Encryption and Decryption using RSA Algorithm with Share Creation Techniques
ISSN: 2249-8958, 2249-8958Veröffentlicht: 30.12.2019Veröffentlicht in International journal of engineering and advanced technology (30.12.2019)“… This proposed schemes share1 encryption and share2 encryption included in RSA algorithm. The share1 and ahare2 decryption process is enable secret image sharing and then stacking …”
Volltext
Journal Article -
13
Analysis of Encryption Algorithms (RSA, SRNN and 2 Key Pair) for Information Security
Veröffentlicht: IEEE 01.08.2017Veröffentlicht in 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA) (01.08.2017)“… So to protect information, we need to encrypt/decrypt information by using cryptography algorithms …”
Volltext
Tagungsbericht -
14
VLSI design of an RSA encryption/decryption chip using systolic array based architecture
ISSN: 0020-7217, 1362-3060Veröffentlicht: Abingdon Taylor & Francis 01.09.2016Veröffentlicht in International journal of electronics (01.09.2016)“… We applied the concept of systolic array to design the RSA encryption/decryption chip by using VHDL hardware language and verified using the TSMC/CIC 0.35 m 1P4 M technology …”
Volltext
Journal Article -
15
File Encryption and Decryption using AES and RSA Algorithm
ISSN: 2456-3307, 2456-3307Veröffentlicht: 05.03.2023Veröffentlicht in International Journal of Scientific Research in Computer Science, Engineering and Information Technology (05.03.2023)“… In this encryption process, we use AES and RSA Algorithm in order to hide images. This encryption techniques helps us to avoid intrusive attacks …”
Volltext
Journal Article -
16
Research and implementation of RSA algorithm for encryption and decryption
ISBN: 145770398X, 9781457703980Veröffentlicht: IEEE 01.08.2011Veröffentlicht in 2011 6th International Forum on Strategic Technology (01.08.2011)“… , forgery and counterfeiting. Encryption and decryption algorithm's security depends on the algorithm while the internal structure of the rigor of mathematics, it also depends on the key confidentiality …”
Volltext
Tagungsbericht -
17
Implementasi Sistem Otentikasi Dokumen Berbasis Quick Response (QR) Code dan Digital Signature
ISSN: 2580-0760, 2580-0760Veröffentlicht: Ikatan Ahli Informatika Indonesia 20.08.2021Veröffentlicht in Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) (Online) (20.08.2021)“… Creating a digital signature requires a hash function algorithm for generating the message digest of the document …”
Volltext
Journal Article -
18
Ensuring Cybersecurity of Data Transmission in Limited Energy Consumption Networks
Veröffentlicht: IEEE 06.10.2020Veröffentlicht in 2020 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon) (06.10.2020)“… The software options used for the RSA and Diffie-Hellman data encryption and decryption algorithms on both the RTP-04M and the Android-based mobile device sides in the Keil …”
Volltext
Tagungsbericht -
19
FSPAlgorithm for encryption/decryption
ISBN: 1424435943, 9781424435944Veröffentlicht: IEEE 01.12.2008Veröffentlicht in 2008 International Conference on Computing, Communication and Networking (01.12.2008)“… Currently there are many industry standard encryption/decryption algorithms including RSA, Rijndael, Blowfish and so forth …”
Volltext
Tagungsbericht -
20
Encryption and decryption of signed graph matrices through RSA algorithm
ISSN: 0019-5588, 0975-7465Veröffentlicht: New Delhi Indian National Science Academy 01.12.2024Veröffentlicht in Indian journal of pure and applied mathematics (01.12.2024)“… and the RSA algorithm …”
Volltext
Journal Article

