Suchergebnisse - python code encryption

  1. 1

    Multicolor fluorescent adjustable hydrogel with high toughness, used for information encryption and alkaline stimulation response von Wu, Zhongli, Xu, Heng, He, Wenjing, Zhou, Kaicheng, Jian, Xiaomin, Xu, Yuhuan, Du, Jiajia, Liu, Xiaonan, Zhang, Daohai

    ISSN: 0925-3467
    Veröffentlicht: Elsevier B.V 01.11.2025
    Veröffentlicht in Optical materials (01.11.2025)
    “… With the rapid development of the information age, fluorescent hydrogels are widely used in information encryption, while traditional hydrogels have disadvantages, such as poor mechanical properties …”
    Volltext
    Journal Article
  2. 2

    NEW CRYPTOSYSTEM USING LINEAR COMBINATION OF FUNCTION AND SUMUDU TRANSFORM WITH PYTHON CODE von Raut, P.P, Hiwarekar, A.P

    ISSN: 2146-1147
    Veröffentlicht: Turkic World Mathematical Society 01.01.2025
    Veröffentlicht in TWMS journal of applied and engineering mathematics (01.01.2025)
    “… We also implemented this method using Python code and finally, we illustrate our results with suitable examples. Keywords: Cryptography, Sumudu Transform, Encryption, Decryption, Information Security …”
    Volltext
    Journal Article
  3. 3

    Experimental validation of IoT image encryption scheme based on a 5-D fractional hyperchaotic system and Numba JIT compiler von Clemente-López, Daniel, Munoz-Pacheco, Jesus M., Rangel-Magdaleno, José de Jesus

    ISSN: 2542-6605, 2542-6605
    Veröffentlicht: Elsevier B.V 01.04.2024
    Veröffentlicht in Internet of things (Amsterdam. Online) (01.04.2024)
    “… It is, therefore, paramount to prove novel encryption algorithms at an experimental level. To overcome that, a potential solution is fractional-order multi-scroll chaotic …”
    Volltext
    Journal Article
  4. 4

    Methods and Benchmark for Detecting Cryptographic API Misuses in Python von Frantz, Miles, Xiao, Ya, Pias, Tanmoy Sarkar, Meng, Na, Yao, Danfeng

    ISSN: 0098-5589, 1939-3520
    Veröffentlicht: New York IEEE 01.05.2024
    Veröffentlicht in IEEE transactions on software engineering (01.05.2024)
    “… The current static code analysis tools for Python are unable to scan the increasing complexity of the source code …”
    Volltext
    Journal Article
  5. 5

    New Method of Cryptography Using Laplace and Sumudu Transforms With Python Code von Priti, P Raut, Anil, P Hiwarekar

    ISSN: 1992-9978, 1992-9986
    Veröffentlicht: Hong Kong International Association of Engineers 01.05.2025
    Veröffentlicht in IAENG international journal of applied mathematics (01.05.2025)
    “… We used Python code to implement this method with examples. We also illustrate our method for Marathi language words and successfully applied it for encrypting paragraphs. Finally, we compared our method with existing cryptosystems for the advancements …”
    Volltext
    Journal Article
  6. 6

    Asymmetric Encryption Scheme to Protect Cloud Data Using Paillier-Cryptosystem von Kumar, Jaydip, Saxena, Vipin

    ISSN: 1942-3594, 1942-3608
    Veröffentlicht: Hershey IGI Global 01.04.2021
    “… So there is a need of resolving crucial security issues to avoid data theft. Hence cloud security provides data encryption for security parameters to change plain-text to cipher-text …”
    Volltext
    Journal Article
  7. 7

    New Method of Cryptography With Python Code Using Elzaki Transform and Linear Combination of Function von Raut, P. P., Hiwarekar, A. P.

    ISSN: 0976-5905, 0975-8607
    Veröffentlicht: Kingsville RGN Publications 01.01.2023
    Veröffentlicht in Communications in Mathematics and Applications (01.01.2023)
    “… This paper deals with new cryptography based iterative method by using successive Elzaki transform of linear combination of functions for encryption and corresponding inverse Elzaki transform for decryption …”
    Volltext
    Journal Article
  8. 8

    Methodological recommendations for implementing an encryption algorithm using a codeword in Python von GRADINARI, Oxana, BOGDANOVA, Violeta, RUSSU, Nicolai

    ISSN: 1857-0623, 2587-3636
    Veröffentlicht: 01.03.2024
    Veröffentlicht in Acta et commentationes: Științe ale Educației (01.03.2024)
    “… The development and execution of the Python program code was carried out in a free interactive cloud environment — Google Colab …”
    Volltext
    Journal Article
  9. 9

    Hands-On Cryptography with Python: Leverage the Power of Python to Encrypt and Decrypt Data von Bowne, Samuel

    ISBN: 1789534445, 9781789534443
    Veröffentlicht: Birmingham Packt Publishing, Limited 2018
    “… This book will show how to encrypt, evaluate, compare, and attack your data using Python. Overall, the book will help you deal with the common errors in encryption …”
    Volltext
    E-Book
  10. 10

    An Innovative Near-Field Communication Security Based on the Chaos Generated by Memristive Circuits Adopted as Symmetrical Key von Kuka, Colin Sokol, Hu, Yihua, Xu, Quan, Alkahtani, Mohammed

    ISSN: 2169-3536, 2169-3536
    Veröffentlicht: Piscataway IEEE 2020
    Veröffentlicht in IEEE access (2020)
    “… One of the latest techniques is the use of the Memristor as an encryption element. In this paper, it has been introduced a two-column array inductor for Memristor-Based Wireless Power Transfer (M-WPT) systems …”
    Volltext
    Journal Article
  11. 11

    An Hybrid Encryption Approach to Secure Data von M, Dr. Ganavi

    ISSN: 2582-3930, 2582-3930
    Veröffentlicht: 24.12.2024
    “… : Advance Encryption standard (AES) algorithm, Hamming code, Image processing, Data security, Encryption, Decryption, python …”
    Volltext
    Journal Article
  12. 12
  13. 13

    Hands-On Bitcoin Programming with Python: Build Powerful Online Payment Centric Applications with Python von Garg, Harish

    ISBN: 1789537002, 9781789537000
    Veröffentlicht: Birmingham Packt Publishing, Limited 2018
    “… Bitcoin is a cryptocurrency that's changing the face of online payments. This book will help you understand everything related to Bitcoin architecture. By the …”
    Volltext
    E-Book
  14. 14

    Secured IoT architecture for personalized marketing using blockchain framework with deep learning technology von Khandekar, Apurva, Ahmad, Sheikh Fahad

    ISSN: 1386-7857, 1573-7543
    Veröffentlicht: New York Springer US 01.11.2024
    Veröffentlicht in Cluster computing (01.11.2024)
    “… The Internet of Things (IoT), the convergence of blockchain and deep learning (DL) technologies presents exciting opportunities for innovation. The integration …”
    Volltext
    Journal Article
  15. 15

    Advancing Quantum Cryptography Algorithms for Secure Data Storage and Processing in Cloud Computing: Enhancing Robustness Against Emerging Cyber Threats von Swetha, Devulapally, Mohiddin, Shaik Khaja

    ISSN: 2158-107X, 2156-5570
    Veröffentlicht: West Yorkshire Science and Information (SAI) Organization Limited 2024
    “… Performance evaluations indicate an encryption time …”
    Volltext
    Journal Article
  16. 16

    Entropy in Image Analysis II

    ISBN: 3039431617, 9783039431618, 9783039431601, 3039431609
    Veröffentlicht: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute 2020
    “… Image analysis is a fundamental task for any application where extracting information from images is required. The analysis requires highly sophisticated …”
    Volltext
    E-Book
  17. 17

    Demonstrating Quantum Homomorphic Encryption Through Simulation von Ganjian, Sohrab, Paddock, Connor, Broadbent, Anne

    Veröffentlicht: IEEE 15.09.2024
    “… In this paradigm, homomorphic encryption (HE) schemes enable a server to run any computation on a client's encrypted data …”
    Volltext
    Tagungsbericht
  18. 18

    Software Protection Using Dynamic PUFs von Xiong, Wenjie, Schaller, Andre, Katzenbeisser, Stefan, Szefer, Jakub

    ISSN: 1556-6013, 1556-6021
    Veröffentlicht: New York IEEE 2020
    “… This paper proposes a Hardware-Entangled Software Protection (HESP) scheme that leverages hardware features to protect software code from malicious modification before or during run-time …”
    Volltext
    Journal Article
  19. 19

    SYMMETRIC ENCRYPTION FROM CYCLIC CODES OVER NON-CHAIN RINGS von DERTLI, RABIA, EREN, ŞENOL

    ISSN: 1844-9581, 2068-3049
    Veröffentlicht: 30.09.2025
    Veröffentlicht in Journal of the sciences and arts (30.09.2025)
    “… This paper introduces a novel encryption scheme constructed over the finite commutative ring S=F₂+uF₂+vF₂ …”
    Volltext
    Journal Article
  20. 20

    Designing an Image Encryption user Interface System von Tiwari, Shubham, Rathore, Harsh, Salunkhe, Rushikesh, Thakare, Neha

    ISSN: 2321-9653, 2321-9653
    Veröffentlicht: 31.03.2023
    “… “Designing an Image Encryption user Interface using Python and Octave” Data Security has become the paramount in most industries right this moment, especially true in the finance and banking industry …”
    Volltext
    Journal Article