Výsledky vyhľadávania - python code encryption

  1. 1

    Multicolor fluorescent adjustable hydrogel with high toughness, used for information encryption and alkaline stimulation response Autor Wu, Zhongli, Xu, Heng, He, Wenjing, Zhou, Kaicheng, Jian, Xiaomin, Xu, Yuhuan, Du, Jiajia, Liu, Xiaonan, Zhang, Daohai

    ISSN: 0925-3467
    Vydavateľské údaje: Elsevier B.V 01.11.2025
    Vydané v Optical materials (01.11.2025)
    “…With the rapid development of the information age, fluorescent hydrogels are widely used in information encryption, while traditional hydrogels have disadvantages, such as poor mechanical properties…”
    Získať plný text
    Journal Article
  2. 2

    NEW CRYPTOSYSTEM USING LINEAR COMBINATION OF FUNCTION AND SUMUDU TRANSFORM WITH PYTHON CODE Autor Raut, P.P, Hiwarekar, A.P

    ISSN: 2146-1147
    Vydavateľské údaje: Turkic World Mathematical Society 01.01.2025
    “… We also implemented this method using Python code and finally, we illustrate our results with suitable examples. Keywords: Cryptography, Sumudu Transform, Encryption, Decryption, Information Security…”
    Získať plný text
    Journal Article
  3. 3

    Experimental validation of IoT image encryption scheme based on a 5-D fractional hyperchaotic system and Numba JIT compiler Autor Clemente-López, Daniel, Munoz-Pacheco, Jesus M., Rangel-Magdaleno, José de Jesus

    ISSN: 2542-6605, 2542-6605
    Vydavateľské údaje: Elsevier B.V 01.04.2024
    “… It is, therefore, paramount to prove novel encryption algorithms at an experimental level. To overcome that, a potential solution is fractional-order multi-scroll chaotic…”
    Získať plný text
    Journal Article
  4. 4

    Hands-On Cryptography with Python: Leverage the Power of Python to Encrypt and Decrypt Data Autor Bowne, Samuel

    ISBN: 1789534445, 9781789534443
    Vydavateľské údaje: Birmingham Packt Publishing, Limited 2018
    “… This book will show how to encrypt, evaluate, compare, and attack your data using Python. Overall, the book will help you deal with the common errors in encryption…”
    Získať plný text
    E-kniha
  5. 5

    Methods and Benchmark for Detecting Cryptographic API Misuses in Python Autor Frantz, Miles, Xiao, Ya, Pias, Tanmoy Sarkar, Meng, Na, Yao, Danfeng

    ISSN: 0098-5589, 1939-3520
    Vydavateľské údaje: New York IEEE 01.05.2024
    “… The current static code analysis tools for Python are unable to scan the increasing complexity of the source code…”
    Získať plný text
    Journal Article
  6. 6

    New Method of Cryptography Using Laplace and Sumudu Transforms With Python Code Autor Priti, P Raut, Anil, P Hiwarekar

    ISSN: 1992-9978, 1992-9986
    Vydavateľské údaje: Hong Kong International Association of Engineers 01.05.2025
    “… We used Python code to implement this method with examples. We also illustrate our method for Marathi language words and successfully applied it for encrypting paragraphs. Finally, we compared our method with existing cryptosystems for the advancements…”
    Získať plný text
    Journal Article
  7. 7

    Hands-On Bitcoin Programming with Python: Build Powerful Online Payment Centric Applications with Python Autor Garg, Harish

    ISBN: 1789537002, 9781789537000
    Vydavateľské údaje: Birmingham Packt Publishing, Limited 2018
    “…Bitcoin is a cryptocurrency that's changing the face of online payments. This book will help you understand everything related to Bitcoin architecture. By the…”
    Získať plný text
    E-kniha
  8. 8

    Asymmetric Encryption Scheme to Protect Cloud Data Using Paillier-Cryptosystem Autor Kumar, Jaydip, Saxena, Vipin

    ISSN: 1942-3594, 1942-3608
    Vydavateľské údaje: Hershey IGI Global 01.04.2021
    “… So there is a need of resolving crucial security issues to avoid data theft. Hence cloud security provides data encryption for security parameters to change plain-text to cipher-text…”
    Získať plný text
    Journal Article
  9. 9

    New Method of Cryptography With Python Code Using Elzaki Transform and Linear Combination of Function Autor Raut, P. P., Hiwarekar, A. P.

    ISSN: 0976-5905, 0975-8607
    Vydavateľské údaje: Kingsville RGN Publications 01.01.2023
    “… This paper deals with new cryptography based iterative method by using successive Elzaki transform of linear combination of functions for encryption and corresponding inverse Elzaki transform for decryption…”
    Získať plný text
    Journal Article
  10. 10

    Methodological recommendations for implementing an encryption algorithm using a codeword in Python Autor GRADINARI, Oxana, BOGDANOVA, Violeta, RUSSU, Nicolai

    ISSN: 1857-0623, 2587-3636
    Vydavateľské údaje: 01.03.2024
    “… The development and execution of the Python program code was carried out in a free interactive cloud environment — Google Colab…”
    Získať plný text
    Journal Article
  11. 11

    An Innovative Near-Field Communication Security Based on the Chaos Generated by Memristive Circuits Adopted as Symmetrical Key Autor Kuka, Colin Sokol, Hu, Yihua, Xu, Quan, Alkahtani, Mohammed

    ISSN: 2169-3536, 2169-3536
    Vydavateľské údaje: Piscataway IEEE 2020
    Vydané v IEEE access (2020)
    “… One of the latest techniques is the use of the Memristor as an encryption element. In this paper, it has been introduced a two-column array inductor for Memristor-Based Wireless Power Transfer (M-WPT) systems…”
    Získať plný text
    Journal Article
  12. 12

    An Hybrid Encryption Approach to Secure Data Autor M, Dr. Ganavi

    ISSN: 2582-3930, 2582-3930
    Vydavateľské údaje: 24.12.2024
    “…: Advance Encryption standard (AES) algorithm, Hamming code, Image processing, Data security, Encryption, Decryption, python…”
    Získať plný text
    Journal Article
  13. 13

    Matrix - Based Encryption: A Python-Driven Approach to Data protection Autor Chandrasekaran, Yuvarani, Angusamy, Ajitha, Suppiah, Yasothei

    Vydavateľské údaje: IEEE 21.07.2025
    “… It has existed for a long time. Data security relies heavily on encryption methods. The advancement of message encryption technology has accelerated due to the utilization of networks and the online world…”
    Získať plný text
    Konferenčný príspevok..
  14. 14
  15. 15

    Secured IoT architecture for personalized marketing using blockchain framework with deep learning technology Autor Khandekar, Apurva, Ahmad, Sheikh Fahad

    ISSN: 1386-7857, 1573-7543
    Vydavateľské údaje: New York Springer US 01.11.2024
    Vydané v Cluster computing (01.11.2024)
    “…The Internet of Things (IoT), the convergence of blockchain and deep learning (DL) technologies presents exciting opportunities for innovation. The integration…”
    Získať plný text
    Journal Article
  16. 16

    Advancing Quantum Cryptography Algorithms for Secure Data Storage and Processing in Cloud Computing: Enhancing Robustness Against Emerging Cyber Threats Autor Swetha, Devulapally, Mohiddin, Shaik Khaja

    ISSN: 2158-107X, 2156-5570
    Vydavateľské údaje: West Yorkshire Science and Information (SAI) Organization Limited 2024
    “… Performance evaluations indicate an encryption time…”
    Získať plný text
    Journal Article
  17. 17

    Python for Offensive PenTest: A Practical Guide to Ethical Hacking and Penetration Testing Using Python Autor Khrais, Hussam

    ISBN: 1788838971, 9781788838979
    Vydavateľské údaje: Birmingham Packt Publishing, Limited 2018
    “…Python is an easy-to-learn and cross-platform programming language which has unlimited third-party libraries…”
    Získať plný text
    E-kniha
  18. 18

    Fileless Attack Patterns Implemented in Python: Design, Encryption, and Detection Lessons Autor Masoud, Mohammad Z., Abduljawad, Mohammd, Foudeh, Husam A., Alsakarnah, Rashed

    Vydavateľské údaje: IEEE 14.12.2025
    “… We implement a minimal three-layer proof-of-concept in Python: (i) a network delivery layer that retrieves encoded payloads, (ii…”
    Získať plný text
    Konferenčný príspevok..
  19. 19

    Demonstrating Quantum Homomorphic Encryption Through Simulation Autor Ganjian, Sohrab, Paddock, Connor, Broadbent, Anne

    Vydavateľské údaje: IEEE 15.09.2024
    “… In this paradigm, homomorphic encryption (HE) schemes enable a server to run any computation on a client's encrypted data…”
    Získať plný text
    Konferenčný príspevok..
  20. 20

    Software Protection Using Dynamic PUFs Autor Xiong, Wenjie, Schaller, Andre, Katzenbeisser, Stefan, Szefer, Jakub

    ISSN: 1556-6013, 1556-6021
    Vydavateľské údaje: New York IEEE 2020
    “… This paper proposes a Hardware-Entangled Software Protection (HESP) scheme that leverages hardware features to protect software code from malicious modification before or during run-time…”
    Získať plný text
    Journal Article