Academic literature on the topic 'Decryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Decryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Decryption"
Partala, Juha. "Symmetric Blind Decryption with Perfect Secrecy." Journal of Computer Networks and Communications 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/6575907.
Full textZheng, Ting, and Zhi Zhong Zhang. "A Method Based on Hash Table to Implement the NAS Layer Decryption in LTE Big Data Platform." Applied Mechanics and Materials 716-717 (December 2014): 1430–33. http://dx.doi.org/10.4028/www.scientific.net/amm.716-717.1430.
Full textBrygilevych, Volodymyr, Nazar Pelypets, and Vasyl Rabyk. "Encryption of text messages using multilayer neural networks." Computational Problems of Electrical Engineering 10, no. 2 (2020): 1–6. http://dx.doi.org/10.23939/jcpee2020.02.001.
Full textKundu, Srijita, and Ernest Y. Z. Tan. "Device-independent uncloneable encryption." Quantum 9 (January 8, 2025): 1582. https://doi.org/10.22331/q-2025-01-08-1582.
Full textPopescu, Narcis I., Cristina Lupu, and Florea Lupu. "Calcium Ionophore-Induced Tissue Factor (TF) Decryption Induces TF Immobilization Into Lipid Rafts and Negative Regulation of TF Procoagulant Activity." Blood 116, no. 21 (2010): 1131. http://dx.doi.org/10.1182/blood.v116.21.1131.1131.
Full textLiang, Hangyu. "The Battle of Advantage between Stealing and Decrypting the German Naval Enigma Key in the Battle of the Atlantic (1940-1941)." Transactions on Social Science, Education and Humanities Research 12 (August 29, 2024): 346–54. http://dx.doi.org/10.62051/1ny8bm98.
Full textSafitri, Sukmawati Indah, Muhammad Khudzaifah, and Mohammad Nafie Jauhari. "Penyandian Pesan Hybrid dengan Myszkowski Cipher dan Rivest, Shamir, Adleman (RSA)." Jurnal Riset Mahasiswa Matematika 2, no. 6 (2023): 214–20. http://dx.doi.org/10.18860/jrmm.v2i6.22017.
Full textPatil, Vedika, Sakshi Jain, and Yogita Shah. "Secure Cryptography by Using Hash Application." Journal of Cyber Security in Computer System 1, no. 1 (2022): 18–24. http://dx.doi.org/10.46610/jcscs.2022.v01i01.002.
Full textIrwanto, Dola. "File Encryption and Decryption Using Algorithm Aes-128 Bit Based Website." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 2 (2024): 670–77. http://dx.doi.org/10.57152/malcom.v4i2.1305.
Full textLiu, Bao Long, Hua Chen, and Yi Guo. "Encrypted XML Data Query Processing with Range Query." Applied Mechanics and Materials 65 (June 2011): 241–45. http://dx.doi.org/10.4028/www.scientific.net/amm.65.241.
Full textDissertations / Theses on the topic "Decryption"
Strand, Martin. "Verifiable Shuffled Decryption." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for matematiske fag, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-21427.
Full textBurman, Annie. "Gendering decryption - decrypting gender : The gender discourse of labour at Bletchley Park 1939-1945." Thesis, Uppsala universitet, Historiska institutionen, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-201046.
Full textTakagi, Tsuyoshi. "New public-key cryptosystems with fast decryption." Phd thesis, [S.l. : s.n.], 2001. http://deposit.ddb.de/cgi-bin/dokserv?idn=962729302.
Full textKäck, Emil. "TLS Decryption in passive monitoring system with server private key." Thesis, Umeå universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-184490.
Full textMerz, Doug, and Bruce Maples. "Encrypt/Decrypt COMSEC Unit for Space-based Command and Telemetry Applications." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/605565.
Full textLoban, H. "A VHDL Implemetation of the Advanced Encryption Standard." Thesis, NURE, MC&FPGA, 2019. https://mcfpga.nure.ua/conf/2019-mcfpga/10-35598-mcfpga-2019-014.
Full textGreinsmark, Carl. "Ransomware." Thesis, Högskolan Kristianstad, Fakulteten för naturvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-20695.
Full textSamuel, David. "RFID security in door locks." Thesis, Linköping University, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-12186.
Full textManteena, Rajender. "A VHDL Implemetation of the Advanced Encryption Standard-Rijndael Algorithm." Scholar Commons, 2004. https://scholarcommons.usf.edu/etd/1149.
Full textKundur, Abhinay. "Digital and Analog Signal Encryption and Decryption in Mid RF Range Using Hybrid Acousto-Optic Chaos." University of Dayton / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1336100009.
Full textBooks on the topic "Decryption"
Martínez-Guerra, Rafael, Juan Javier Montesinos-García, and Juan Pablo Flores-Flores. Encryption and Decryption Algorithms for Plain Text and Images using Fractional Calculus. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20698-6.
Full textPaulus, Max. Der Diskos von Phaistos: Ein Ansatz zu seiner Entschlüsselung / = The Phaistos disk : an approach to its decryption. 2nd ed. Verlag Dr. Kovac, 2017.
Find full textPaulus, Max. Der Diskos von Phaistos: Ein Ansatz zu seiner Entschlüsselung = The Phaistos disk : an approach to its decryption. Kovac, 2014.
Find full textMuniraj, Inbarasan, and John T. Sheridan. Optical Encryption and Decryption. SPIE, 2019. http://dx.doi.org/10.1117/3.2523506.
Full textBook chapters on the topic "Decryption"
Weik, Martin H. "decryption." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_4547.
Full textKaliski, Burt. "Decryption Exponent." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_400.
Full textMu, Yi, Vijay Varadharajan, and Khan Quac Nguyen. "Delegated Decryption." In Cryptography and Coding. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-46665-7_30.
Full textKaliski, Burt. "Decryption Exponent." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_400.
Full textRyan, Mark D. "Making Decryption Accountable." In Security Protocols XXV. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-71075-4_11.
Full textGreen, Matthew. "Secure Blind Decryption." In Public Key Cryptography – PKC 2011. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19379-8_16.
Full textHassan, Nihad A. "Ransomware Decryption Tools." In Ransomware Revealed. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4255-1_8.
Full textKävrestad, Joakim. "Decryption and Password Enforcing." In Fundamentals of Digital Forensics. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-96319-8_5.
Full textKävrestad, Joakim. "Decryption and Password Enforcing." In Fundamentals of Digital Forensics. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38954-3_5.
Full textOhta, Kazuo. "Remarks on blind decryption." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0030413.
Full textConference papers on the topic "Decryption"
Mishra, Shreshtha, Ojusav Agarwal, and Sunil Kumar Patel. "Quantum Decryption using Shor’s Algorithm." In 2024 IEEE Pune Section International Conference (PuneCon). IEEE, 2024. https://doi.org/10.1109/punecon63413.2024.10895777.
Full textShah, Aaryak, Alok Kumar Kamal, and Neeraj. "Steganographic Encryption and Decryption Using Duality Preserving GANs." In 2024 IEEE 22nd International Conference on Industrial Informatics (INDIN). IEEE, 2024. https://doi.org/10.1109/indin58382.2024.10774348.
Full textKuppan, Ajith Kumar, Raviraj Bhat, and Uday Trivedi. "QUIC SNI decryption usefulness prediction using Machine Learning." In 2024 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT). IEEE, 2024. http://dx.doi.org/10.1109/conecct62155.2024.10677263.
Full textV, Thanikaiselvan, Abilash P, Lingeswar C, et al. "Chaotic Audio Encryption and Decryption Using Logistic Map." In 2024 IEEE International Conference on Automatic Control and Intelligent Systems (I2CACIS). IEEE, 2024. http://dx.doi.org/10.1109/i2cacis61270.2024.10649629.
Full textAmano, Hodaka, Keiji Shimada, Reika Suketomo, Ryosuke Matsumoto, and Takahiro Kodama. "Impact of AES-CTR Mode Modified QAM Symbol Block Cipher on Nonlinear Fiber-Optic Channels." In CLEO: Science and Innovations. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/cleo_si.2024.sth3q.2.
Full textMatsumoto, Ryosuke, and Takahiro Kodama. "High-Speed Quantum Noise Stream Cipher System Enabled by Optical Fiber-based Encryption and Low-Complexity Digital Decryption." In CLEO: Science and Innovations. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/cleo_si.2024.sth3q.1.
Full textZivic, Natasa, Esad Kadusic, and Mirko Skrbic. "Mathematical optimization of decrypting algorithm for soft input decryption." In 2009 XXII International Symposium on Information, Communication and Automation Technologies (ICAT 2009). IEEE, 2009. http://dx.doi.org/10.1109/icat.2009.5348411.
Full textMüller, Jens, Fabian Ising, Vladislav Mladenov, Christian Mainka, Sebastian Schinzel, and Jörg Schwenk. "Practical Decryption exFiltration." In CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2019. http://dx.doi.org/10.1145/3319535.3354214.
Full textKalaichelvi, V., and R. M. Chandrasekaran. "FSPAlgorithm for encryption/decryption." In 2008 International Conference on Computing, Communication and Networking (ICCCN). IEEE, 2008. http://dx.doi.org/10.1109/icccnet.2008.4787779.
Full textGahi, Youssef, Farid Bourennani, Mouhcine Guennoun, and Hussein T. Mouftah. "Blind decryption for cloud computing." In 2016 IEEE Symposium on Computers and Communication (ISCC). IEEE, 2016. http://dx.doi.org/10.1109/iscc.2016.7543875.
Full textReports on the topic "Decryption"
Negron, Melvin S. Study of the Hill Cipher Encryption/Decryption Algorithm. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada581720.
Full textDolmatov, V., ed. GOST 28147-89: Encryption, Decryption, and Message Authentication Code (MAC) Algorithms. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5830.
Full textFedoseev, O. N. Calculation of the coverage area based on GOOGLE EARTH satellite images (MAP PIXEL-decryption V1.1 ). Ailamazyan Program Systems Institute of Russian Academy of Sciences, 2024. http://dx.doi.org/10.12731/ofernio.2023.25277.
Full textEverett, Martin. EU–US collaboration on quantum technologies. Royal Institute of International Affairs, 2021. http://dx.doi.org/10.55317/9781784134211.
Full textvon Luckner, Clemens Graf, Carmen Reinhart, and Kenneth Rogoff. Decrypting New Age International Capital Flows. National Bureau of Economic Research, 2021. http://dx.doi.org/10.3386/w29337.
Full text