Výsledky vyhľadávania - Symmetric decryption algorithm

Upresniť hľadanie
  1. 1

    Local thinning of 3D stereo images based on symmetric decryption algorithm Autor Wu, Chenglin, Li, Zhaoyang

    ISSN: 0141-9331, 1872-9436
    Vydavateľské údaje: Kidlington Elsevier B.V 01.04.2021
    Vydané v Microprocessors and microsystems (01.04.2021)
    “… Based on the symmetric decryption algorithm, this method acquires the symmetric information of 3-D stereo image, filters out the pseudo-feature points, extracts the local detail features of 3-D…”
    Získať plný text
    Journal Article
  2. 2

    Energy Optimization on Symmetric Key Encryption and Decryption Algorithm using Genetic Algorithm Autor Mishra, Ratnesh, Shukla, Ravi Shanker, Shukla, Rajesh K., Tewari, R.R.

    ISSN: 2278-3075, 2278-3075
    Vydavateľské údaje: 30.08.2019
    “…In this paper we have proposed energy optimization on symmetric key encryption and decryption algorithm are using genetic algorithm where we have used symmetric key for encryption…”
    Získať plný text
    Journal Article
  3. 3
  4. 4

    Numerical algorithms for corner-modified symmetric Toeplitz linear system with applications to image encryption and decryption Autor Zhang, Xing, Zheng, Yanpeng, Jiang, Zhaolin, Byun, Heejung

    ISSN: 1598-5865, 1865-2085
    Vydavateľské údaje: Berlin/Heidelberg Springer Berlin Heidelberg 01.04.2023
    “… Based on the decomposition of Toeplitz inversion and order-reduction algorithm, two new algorithms for the product of symmetric Toplitz inversion and the vector are proposed…”
    Získať plný text
    Journal Article
  5. 5

    Improvement security in e-business systems using hybrid algorithm Autor Sumaryanti, L., Kusuma, Dedy Hidayat, Widijastuti, Rosmala, Muzaki, Muhammad Najibulloh

    ISSN: 1693-6930, 2302-9293
    Vydavateľské údaje: Yogyakarta Ahmad Dahlan University 01.10.2021
    Vydané v Telkomnika (01.10.2021)
    “… Encryption and decryption of messages or information carried by a symmetric key using the simple symmetric key algorithm and asymmetric keys using the Rivest Shamir Adleman (RSA) algorithm…”
    Získať plný text
    Journal Article
  6. 6

    A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets Autor Ahmad, Sahan, Alam, Kazi Md Rokibul, Rahman, Habibur, Tamura, Shinsuke

    Vydavateľské údaje: IEEE 01.01.2015
    “…This paper presents a comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets through simulation…”
    Získať plný text
    Konferenčný príspevok..
  7. 7

    Efficient implementation of 1024-bit symmetric encryption and decryption algorithm for real time communication systems Autor Ishfaq, Abubakar, Naqash, Talha, Hasan, M. Amish, Mukhtar, Amir, Ashraf Ch, M.Ali, Mujahid, Umar, Najam-ul-Islam, M.

    ISBN: 9781467351584, 146735158X
    Vydavateľské údaje: IEEE 01.12.2012
    “… However AES cannot meet the requirements for real time communication. In this paper we have proposed a symmetric encryption algorithm operating at 1024-bits of data…”
    Získať plný text
    Konferenčný príspevok..
  8. 8

    Comparative Analysis of Encryption-Decryption Data Use the Symmetrical Key Algorithm of Bit Inserted Carrier (BIC) Autor Alfina, Ommi, Syahputri, Nita, Indriani, Ulfah, Harahap, Dina Irmayanti, Ginting, Erwin

    Vydavateľské údaje: IEEE 01.08.2018
    “… This study aims to establish a security system by using a cryptographic algorithm called Bit Inserted Carrier (BIC…”
    Získať plný text
    Konferenčný príspevok..
  9. 9

    Symmetric Key Encryption Based on Rotation-Translation Equation Autor Stoyanov, Borislav, Nedzhibov, Gyurhan

    ISSN: 2073-8994, 2073-8994
    Vydavateľské údaje: Basel MDPI AG 01.01.2020
    Vydané v Symmetry (Basel) (01.01.2020)
    “…–translation equation is proposed. We develop the new encryption-decryption algorithm by using the concept of symmetric key instead of public key…”
    Získať plný text
    Journal Article
  10. 10

    Performance Analysis of Symmetric Encryption Algorithms for their Encryption and Decryption Time Autor Advani, Nilesh Amarbhai, Gonsai, Atul M.

    Vydavateľské údaje: Bharati Vidyapeeth, New Delhi. Copy Right in Bulk will be transferred to IEEE by Bharati Vidyapeeth 01.03.2019
    “… For this we need various mechanisms for the same. Several symmetric and asymmetric algorithms exist for this purpose…”
    Získať plný text
    Konferenčný príspevok..
  11. 11
  12. 12
  13. 13

    A Symmetric Reversible Audio Information Hiding Algorithm Using Matrix Embedding Within Image Carriers Autor Tuo, Yongqiang, Li, Guodong, Hou, Kaiyue

    ISSN: 2073-8994, 2073-8994
    Vydavateľské údaje: Basel MDPI AG 01.12.2024
    Vydané v Symmetry (Basel) (01.12.2024)
    “…To address the vulnerability of existing hiding algorithms to differential attacks and the limitations of single chaotic systems, such as small key space and low security, a novel algorithm combining…”
    Získať plný text
    Journal Article
  14. 14
  15. 15

    Disabling Tracing in Black-Box-Traceable CP-ABE System: Alert Decryption Black Box Autor Qiao, Huidong, Ren, Jiangchun, Wang, Zhiying, Hu, Ying

    ISSN: 2073-8994, 2073-8994
    Vydavateľské údaje: Basel MDPI AG 01.01.2024
    Vydané v Symmetry (Basel) (01.01.2024)
    “…In application scenarios such as cloud storage, a symmetric algorithm can be used to encrypt massive data…”
    Získať plný text
    Journal Article
  16. 16

    Hybrid cryptosystem RSA - CRT optimization and VMPC Autor Rahmadani, R, Mawengkang, H, Sutarman

    ISSN: 1742-6588, 1742-6596
    Vydavateľské údaje: Bristol IOP Publishing 01.03.2018
    Vydané v Journal of physics. Conference series (01.03.2018)
    “…Hybrid cryptosystem combines symmetric algorithms and asymmetric algorithms. This combination utilizes speeds on encryption/decryption processes of symmetric algorithms and asymmetric algorithms to secure symmetric keys…”
    Získať plný text
    Journal Article
  17. 17
  18. 18

    An efficient mixed mode and paired cipher text cryptographic algorithm for effective key distribution Autor S, Rasmi P, Paul, Varghese

    ISSN: 1074-5351, 1099-1131
    Vydavateľské údaje: Chichester Blackwell Publishing Ltd 01.11.2014
    “… (hidden root problem, discrete logarithms, and factoring) to make the algorithm too secure and uses the properties of both symmetric and asymmetric key algorithms…”
    Získať plný text
    Journal Article
  19. 19

    Security algorithm of Internet of Things based on ZigBee protocol Autor Wang, Yongkang, Chen, Chunxia, Jiang, Qijie

    ISSN: 1386-7857, 1573-7543
    Vydavateľské údaje: New York Springer US 01.11.2019
    Vydané v Cluster computing (01.11.2019)
    “… Then, the principle of AES-128 algorithm is analyzed, and the steps of decryption algorithm are adjusted, so that the decryption algorithm is symmetric in structure and encryption algorithm…”
    Získať plný text
    Journal Article
  20. 20

    Quantum Image Encryption and Decryption Algorithms Based on Quantum Image Geometric Transformations Autor Zhou, Ri-Gui, Wu, Qian, Zhang, Man-Qun, Shen, Chen-Yi

    ISSN: 0020-7748, 1572-9575
    Vydavateľské údaje: Boston Springer US 01.06.2013
    “… Although following the symmetric cryptosystem for which the participations in the communication keep exactly the same keys, the special for the encryption and decryption algorithms proposed…”
    Získať plný text
    Journal Article