Journal articles on the topic 'Decryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Decryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Partala, Juha. "Symmetric Blind Decryption with Perfect Secrecy." Journal of Computer Networks and Communications 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/6575907.
Full textZheng, Ting, and Zhi Zhong Zhang. "A Method Based on Hash Table to Implement the NAS Layer Decryption in LTE Big Data Platform." Applied Mechanics and Materials 716-717 (December 2014): 1430–33. http://dx.doi.org/10.4028/www.scientific.net/amm.716-717.1430.
Full textBrygilevych, Volodymyr, Nazar Pelypets, and Vasyl Rabyk. "Encryption of text messages using multilayer neural networks." Computational Problems of Electrical Engineering 10, no. 2 (2020): 1–6. http://dx.doi.org/10.23939/jcpee2020.02.001.
Full textKundu, Srijita, and Ernest Y. Z. Tan. "Device-independent uncloneable encryption." Quantum 9 (January 8, 2025): 1582. https://doi.org/10.22331/q-2025-01-08-1582.
Full textPopescu, Narcis I., Cristina Lupu, and Florea Lupu. "Calcium Ionophore-Induced Tissue Factor (TF) Decryption Induces TF Immobilization Into Lipid Rafts and Negative Regulation of TF Procoagulant Activity." Blood 116, no. 21 (2010): 1131. http://dx.doi.org/10.1182/blood.v116.21.1131.1131.
Full textLiang, Hangyu. "The Battle of Advantage between Stealing and Decrypting the German Naval Enigma Key in the Battle of the Atlantic (1940-1941)." Transactions on Social Science, Education and Humanities Research 12 (August 29, 2024): 346–54. http://dx.doi.org/10.62051/1ny8bm98.
Full textSafitri, Sukmawati Indah, Muhammad Khudzaifah, and Mohammad Nafie Jauhari. "Penyandian Pesan Hybrid dengan Myszkowski Cipher dan Rivest, Shamir, Adleman (RSA)." Jurnal Riset Mahasiswa Matematika 2, no. 6 (2023): 214–20. http://dx.doi.org/10.18860/jrmm.v2i6.22017.
Full textPatil, Vedika, Sakshi Jain, and Yogita Shah. "Secure Cryptography by Using Hash Application." Journal of Cyber Security in Computer System 1, no. 1 (2022): 18–24. http://dx.doi.org/10.46610/jcscs.2022.v01i01.002.
Full textIrwanto, Dola. "File Encryption and Decryption Using Algorithm Aes-128 Bit Based Website." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 2 (2024): 670–77. http://dx.doi.org/10.57152/malcom.v4i2.1305.
Full textLiu, Bao Long, Hua Chen, and Yi Guo. "Encrypted XML Data Query Processing with Range Query." Applied Mechanics and Materials 65 (June 2011): 241–45. http://dx.doi.org/10.4028/www.scientific.net/amm.65.241.
Full textWadehra, Shivangi, Shivam Goel, and Nidhi Sengar. "AES Algorithm: Encryption and Decryption." International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (2018): 1075–77. http://dx.doi.org/10.31142/ijtsrd11221.
Full textNovianti, Chofifah Alfin, Muhammad Khudzaifah, and Mohammad Nafie Jauhari. "Kriptografi Hibrida Cipher Block Chaining (CBC) dan Merkle-Hellman Knapsack untuk Pengamanan Pesan Teks." Jurnal Riset Mahasiswa Matematika 3, no. 1 (2023): 10–25. http://dx.doi.org/10.18860/jrmm.v3i1.22292.
Full textNugroho, Widhi Bagus, Ajib Susanto, Christy Atika Sari, Eko Hari Rachmawanto, and Mohamed Doheir. "A ROBUST AND IMPERCEPTIBLE FOR DIGITAL IMAGE ENCRYPTION USING CHACHA20." Jurnal Teknik Informatika (Jutif) 5, no. 2 (2024): 397–404. https://doi.org/10.52436/1.jutif.2024.5.2.1470.
Full textLee, Sang-Un, and Myeong-Bok Choi. "Integer Factorization for Decryption." Journal of the Institute of Webcasting, Internet and Telecommunication 13, no. 6 (2013): 221–28. http://dx.doi.org/10.7236/jiibc.2013.13.6.221.
Full textCeruzzi, P. "Decryption Day by Day." Science 264, no. 5161 (1994): 990–92. http://dx.doi.org/10.1126/science.264.5161.990.
Full textButenas, Saulius, and Jolanta Krudysz-Amblo. "Decryption of tissue factor." Thrombosis Research 129 (May 2012): S18—S20. http://dx.doi.org/10.1016/j.thromres.2012.02.022.
Full textBalasubramanian, Dr Kannan, M. Arun, and Dr K. R. Sekar. "An Improved RSA Algorithm for Enhanced Security." Indian Journal of Cryptography and Network Security 2, no. 2 (2022): 1–4. http://dx.doi.org/10.54105/ijcns.b1421.112222.
Full textDr., Kannan Balasubramanian, Arun M., and K. R. Sekar Dr. "An Improved RSA Algorithm for Enhanced Security." Indian Journal of Cryptography and Network Security (IJCNS) 2, no. 2 (2022): 1–4. https://doi.org/10.54105/ijcns.B1421.112222.
Full textLevchenko, V., I. Shulga, А. Romanyuk, and L. Bezverkha. "USE OF REMOTE GEOINFORMATION TECHNOLOGIES FOR FOREST PATHOLOGY MONITORING IN THE ZHYTOMYR POLISSYA." Innovative Solution in Modern Science 2, no. 38 (2020): 20. http://dx.doi.org/10.26886/2414-634x.2(38)2020.3.
Full textAbu-Faraj, Mua’ad, Abeer Al-Hyari, and Ziad Alqadi. "A DUAL APPROACH TO DIGITAL AUDIO SIGNAL CRYPTOGRAPHY." Journal of Southwest Jiaotong University 57, no. 1 (2022): 24–33. http://dx.doi.org/10.35741/issn.0258-2724.57.1.3.
Full textSmelova, Svetlana Stanislavovna, and Mikhail Sergeevich Zverkov. "Using of remote sensing data and field surveys to solve the problems of geobotanical mapping of reclaimed lands." Ekologiya i stroitelstvo, no. 2 (June 25, 2022): 23–33. https://doi.org/10.35688/2413-8452-2022-02-003.
Full textGao, Ming Hu, and Hong Yuan Huang. "A New Efficient Variant of the Batch RSA Cryptosystem." Advanced Materials Research 756-759 (September 2013): 2660–62. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2660.
Full textJin, Zhihong. "A Brief Discussion on Data Encryption and Decryption Technology and Its Applications." Journal of Electronic Research and Application 9, no. 2 (2025): 159–65. https://doi.org/10.26689/jera.v9i2.9915.
Full textGao, Ronghai, Jiwen Zeng, and Lunzhi Deng. "An efficient certificateless multi-receiver threshold decryption scheme." RAIRO - Theoretical Informatics and Applications 53, no. 1-2 (2019): 67–84. http://dx.doi.org/10.1051/ita/2019001.
Full textRuan, Wei Hua, and Qing Sheng Hu. "A Kind of Logarithmic Function Hardware Encryptor and Decryptor." Applied Mechanics and Materials 427-429 (September 2013): 2956–59. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2956.
Full textVagizov, M. R., S. Y. Stepanov, Y. A. Petrov, and A. Y. Sidorenko. "Method of decryption and inventory of forest plantations by means of GIS AutoCad Map." Geoinformatika, no. 4 (2020): 20–27. http://dx.doi.org/10.47148/1609-364x-2020-4-20-27.
Full textSong, Qinghua, Samira Khadir, Stéphane Vézian, et al. "Printing polarization and phase at the optical diffraction limit: near- and far-field optical encryption." Nanophotonics 10, no. 1 (2020): 697–704. http://dx.doi.org/10.1515/nanoph-2020-0352.
Full textPronika, Pronika, and S. S. Tyagi. "Performance analysis of encryption and decryption algorithm." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 2 (2021): 1030–38. https://doi.org/10.11591/ijeecs.v23.i2.pp1030-1038.
Full textChiriac, Liubomir, Aurel Danilov, and Violeta Bogdanova. "Encryption and decryption algorithm based on the Latin groupoid isotopes." Acta et commentationes Ştiinţe Exacte şi ale Naturii 14, no. 2 (2022): 117–31. http://dx.doi.org/10.36120/2587-3644.v14i2.117-131.
Full textBrovets, Andrey I. "The deciphering stimulus of a compound word: the problem of definition and description." Russian Language Studies 17, no. 4 (2019): 487–501. http://dx.doi.org/10.22363/2618-8163-2019-17-4-487-501.
Full textZhang, Kai, Yanping Li, Yun Song, Laifeng Lu, Tao Zhang, and Qi Jiang. "A Traceable and Revocable Multiauthority Attribute-Based Encryption Scheme with Fast Access." Security and Communication Networks 2020 (December 22, 2020): 1–14. http://dx.doi.org/10.1155/2020/6661243.
Full textPronika, Pronika, and S. S. Tyagi. "Performance analysis of encryption and decryption algorithm." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 2 (2021): 1030. http://dx.doi.org/10.11591/ijeecs.v23.i2.pp1030-1038.
Full textChen, Chao, Hongying Zhang, and Bin Wu. "Image Encryption Based on Arnod Transform and Fractional Chaotic." Symmetry 14, no. 1 (2022): 174. http://dx.doi.org/10.3390/sym14010174.
Full textAyush, Mittal, and Kumar Gupta Ravindra. "A Cryptographic Technique Involving Finite Fields and Logical Operators." Indian Journal of Science and Technology 13, no. 3 (2020): 316–28. https://doi.org/10.17485/ijst/2020/v13i03/148904.
Full textAl-Fayoumi, Mohammed, and Sttar Aboud. "Blind Decryption and Privacy Protection." American Journal of Applied Sciences 2, no. 4 (2005): 873–76. http://dx.doi.org/10.3844/ajassp.2005.873.876.
Full textHewage, Chaminda, Ambikesh Jayal, Glenn Jenkins, and Ryan J. Brown. "A Learned Polyalphabetic Decryption Cipher." SNE Simulation Notes Europe 28, no. 4 (2018): 141–48. http://dx.doi.org/10.11128/sne.28.tn.10441.
Full textSIROMONEY, RANI, K. G. SUBRAMANIAN, and P. J. ABISHA. "ENCRYPTION-DECRYPTION TECHNIQUES FOR PICTURES." International Journal of Pattern Recognition and Artificial Intelligence 03, no. 03n04 (1989): 497–503. http://dx.doi.org/10.1142/s0218001489000371.
Full textCheatham, Tom. "MESSAGE DECRYPTION AND SPELLING CHECKERS." Cryptologia 11, no. 2 (1987): 115–18. http://dx.doi.org/10.1080/0161-118791861901.
Full textVS, Barath. "Secured Folder Encryption and Decryption." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 121–29. http://dx.doi.org/10.22214/ijraset.2024.64953.
Full textEncinas, L. Hernández, J. Muñoz Masqué, and A. Queiruga Dios. "Large decryption exponents in RSA." Applied Mathematics Letters 16, no. 3 (2003): 293–95. http://dx.doi.org/10.1016/s0893-9659(03)80046-0.
Full textMillen, Jonathan. "On the freedom of decryption." Information Processing Letters 86, no. 6 (2003): 329–33. http://dx.doi.org/10.1016/s0020-0190(03)00211-4.
Full textRao, L. Vijaya Mohan. "Tissue factor mechanisms of decryption." Frontiers in Bioscience E4, no. 4 (2012): 1513–27. http://dx.doi.org/10.2741/e477.
Full textDevi, SistlaVasundhara, and Harika Devi Kotha. "AES encryption and decryption standards." Journal of Physics: Conference Series 1228 (May 2019): 012006. http://dx.doi.org/10.1088/1742-6596/1228/1/012006.
Full textNayak, Nikhilesh, Akshay Chandak, Nisarg Shah, and B. Karthikeyan. "Encryption and decryption using FPGA." IOP Conference Series: Materials Science and Engineering 263 (November 2017): 052030. http://dx.doi.org/10.1088/1757-899x/263/5/052030.
Full textBhargava, Puvvula, and Kuppam Hari Kishan. "144-BIT Encryption/Decryption Technique." International Journal of Computer Applications 1, no. 21 (2010): 67–74. http://dx.doi.org/10.5120/53-647.
Full textRathi, Amit, Raj Saini, Abhinav Mishra, Vivek Kumar Sharma, and Jagbeer Singh. "File Encryption and Decryption Software." Journal of Computer Based Parallel Programming 8, no. 1 (2023): 5–13. http://dx.doi.org/10.46610/jocpp.2023.v08i01.002.
Full textLadda, Priyanka, Shyama Yadav, and Shashank Vyas. "Decryption and Encryption of Data." Journal of Nonlinear Analysis and Optimization 14, no. 01 (2023): 86–93. http://dx.doi.org/10.36893/jnao.2023.v14i1.087-093.
Full textSalmanov, V. "POLYMORPHİC ENCRYPTİON AND DECRYPTİON ALGORİTHMS." Sciences of Europe, no. 98 (August 8, 2022): 76–79. https://doi.org/10.5281/zenodo.6973815.
Full textShivangi, Wadehra, Goel Shivam, and Sengar Nidhi. "AES Algorithm Encryption and Decryption." International Journal of Trend in Scientific Research and Development 2, no. 3 (2019): 1075–77. https://doi.org/10.31142/ijtsrd11221.
Full textKumar, Dilip, Manoj Kumar, and Gaurav Gupta. "An Outsourced Decryption ABE Model using ECC in Internet of Things." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 29, no. 06 (2021): 949–64. http://dx.doi.org/10.1142/s0218488521500422.
Full text