To see the other types of publications on this topic, follow the link: Decryption.

Journal articles on the topic 'Decryption'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Decryption.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Partala, Juha. "Symmetric Blind Decryption with Perfect Secrecy." Journal of Computer Networks and Communications 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/6575907.

Full text
Abstract:
A blind decryption scheme enables a user to query decryptions from a decryption server without revealing information about the plain-text message. Such schemes are useful, for example, for the implementation of privacy-preserving encrypted file storages and payment systems. In terms of functionality, blind decryption is close to oblivious transfer. For noiseless channels, information-theoretically secure oblivious transfer is impossible. However, in this paper, we show that this is not the case for blind decryption. We formulate a definition of perfect secrecy of symmetric blind decryption for
APA, Harvard, Vancouver, ISO, and other styles
2

Zheng, Ting, and Zhi Zhong Zhang. "A Method Based on Hash Table to Implement the NAS Layer Decryption in LTE Big Data Platform." Applied Mechanics and Materials 716-717 (December 2014): 1430–33. http://dx.doi.org/10.4028/www.scientific.net/amm.716-717.1430.

Full text
Abstract:
Firstly, this paper introduces the overall framework and design ideas of LTE big data platform. Secondly, it describes the principles of decrypting encrypted data. In view of the distribution characters of keys required by NAS layer decryption, a decryption scheme for analysis and implementation based on the data structure of hash bucket is proposed. Finally, this scheme is validated and analyzed. Aiming to studying decryption scheme of NAS date, applying this scheme to analyze the LTE big data platform and implementing the function of encrypt the NAS PDU in LTE big data platform. The scheme h
APA, Harvard, Vancouver, ISO, and other styles
3

Brygilevych, Volodymyr, Nazar Pelypets, and Vasyl Rabyk. "Encryption of text messages using multilayer neural networks." Computational Problems of Electrical Engineering 10, no. 2 (2020): 1–6. http://dx.doi.org/10.23939/jcpee2020.02.001.

Full text
Abstract:
The article considers an algorithm for encrypting / decrypting text messages using multilayer neural networks (MLNN). The algorithm involves three steps: training a neural network based on the training pairs formed from a basic set of characters found in the text; encryption of the message using the weight coefficients of the hidden layers; its decryption using the weight coefficients of the output layer. The conditions necessary for successful encryption / decryption with this algorithm are formed, its limitations are emphasized. The MLNN architecture and training algorithm are described. The
APA, Harvard, Vancouver, ISO, and other styles
4

Kundu, Srijita, and Ernest Y. Z. Tan. "Device-independent uncloneable encryption." Quantum 9 (January 8, 2025): 1582. https://doi.org/10.22331/q-2025-01-08-1582.

Full text
Abstract:
Uncloneable encryption, first introduced by Broadbent and Lord (TQC 2020) is a quantum encryption scheme in which a quantum ciphertext cannot be distributed between two non-communicating parties such that, given access to the decryption key, both parties cannot learn the underlying plaintext. In this work, we introduce a variant of uncloneable encryption in which several possible decryption keys can decrypt a particular encryption, and the security requirement is that two parties who receive independently generated decryption keys cannot both learn the underlying ciphertext. We show that this
APA, Harvard, Vancouver, ISO, and other styles
5

Popescu, Narcis I., Cristina Lupu, and Florea Lupu. "Calcium Ionophore-Induced Tissue Factor (TF) Decryption Induces TF Immobilization Into Lipid Rafts and Negative Regulation of TF Procoagulant Activity." Blood 116, no. 21 (2010): 1131. http://dx.doi.org/10.1182/blood.v116.21.1131.1131.

Full text
Abstract:
Abstract Abstract 1131 Cell exposed tissue factor (TF), the physiologic initiator of blood coagulation, is normally expressed in a low procoagulant, or cryptic conformation, and requires activation, or decryption, to fully exhibit its procoagulant potential. TF decryption is not fully understood and multiple decrypting mechanisms have been proposed including phosphatidylserine (PS) exposure, TF monomerization, association with lipid rafts and redox modulation of TF. Calcium ionophores have been extensively used as TF decrypting agents, and both PS-dependent and independent mechanisms have been
APA, Harvard, Vancouver, ISO, and other styles
6

Liang, Hangyu. "The Battle of Advantage between Stealing and Decrypting the German Naval Enigma Key in the Battle of the Atlantic (1940-1941)." Transactions on Social Science, Education and Humanities Research 12 (August 29, 2024): 346–54. http://dx.doi.org/10.62051/1ny8bm98.

Full text
Abstract:
In the early years of World War II, German Navy used Enigma to encode messages and prevent their intelligence by Allies. This work considers advantages of stealing and technically decrypting the German Naval Enigma key during the Battle of Atlantic from 1940-41; while Allies had already succeeded in decrypting the German Army Enigma prior to the war. The complexities of Naval Enigma introduced new challenges. Yet British codebreakers persisted with technological decryption — an approach they adopted following their earlier successes. However, details embedded within Naval Enigma plus changes i
APA, Harvard, Vancouver, ISO, and other styles
7

Safitri, Sukmawati Indah, Muhammad Khudzaifah, and Mohammad Nafie Jauhari. "Penyandian Pesan Hybrid dengan Myszkowski Cipher dan Rivest, Shamir, Adleman (RSA)." Jurnal Riset Mahasiswa Matematika 2, no. 6 (2023): 214–20. http://dx.doi.org/10.18860/jrmm.v2i6.22017.

Full text
Abstract:
Classical and modern cryptography have advantages and disadvantages in securing text messages. Hybrid algorithms can combine two algorithms to produce a higher level of message security when compared to one type of algorithm. This study discusses a hybrid algorithm that combines Myszkowski Cipher and RSA. The purpose of this research is to obtain ciphertext that is more difficult to crack by cryptanalysis. The hybrid algorithm process is done by encrypting text messages with the Myszkowski Cipher algorithm then the key used in the Myszkowski Cipher algorithm are encrypted using the RSA algorit
APA, Harvard, Vancouver, ISO, and other styles
8

Patil, Vedika, Sakshi Jain, and Yogita Shah. "Secure Cryptography by Using Hash Application." Journal of Cyber Security in Computer System 1, no. 1 (2022): 18–24. http://dx.doi.org/10.46610/jcscs.2022.v01i01.002.

Full text
Abstract:
This project is basically design for ensuring security to all kinds of data format file such as pdf, text, images, audio, videos etc. This is carried out using various keys and hashing algorithm. This project basically helps the end user to protect his/her personal files from the unauthorized user and can also restrict its access to the limited people. This complete process is carried out in two methods that are encryption and decryption. Encryption process required varchar key while encryption the data file which convert the original file in to incomprehensible format. Further in decryption p
APA, Harvard, Vancouver, ISO, and other styles
9

Irwanto, Dola. "File Encryption and Decryption Using Algorithm Aes-128 Bit Based Website." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 2 (2024): 670–77. http://dx.doi.org/10.57152/malcom.v4i2.1305.

Full text
Abstract:
Digital data security has become very important in the current information era. One way to maintain data security is to use encryption and decryption techniques. The Advanced Encryption Standard (AES) algorithm has been proven effective in protecting data with a high level of security. This research aims to implement the AES-128 bit algorithm for online file encryption and decryption via a website. The method used in this research includes developing a website that provides a user interface for uploading and encrypting files, as well as for decrypting files that have been previously encrypted.
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Bao Long, Hua Chen, and Yi Guo. "Encrypted XML Data Query Processing with Range Query." Applied Mechanics and Materials 65 (June 2011): 241–45. http://dx.doi.org/10.4028/www.scientific.net/amm.65.241.

Full text
Abstract:
Without decrypting the encrypted blocks, it is difficult to query encrypted XML data. Inspired by Query-Aware decryption scheme, the paper extends the scheme to support range query with value index. Value index is based on order preserving encryption. The testing results indicate that the proposed scheme can complete a correct query processing, and support range query.
APA, Harvard, Vancouver, ISO, and other styles
11

Wadehra, Shivangi, Shivam Goel, and Nidhi Sengar. "AES Algorithm: Encryption and Decryption." International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (2018): 1075–77. http://dx.doi.org/10.31142/ijtsrd11221.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Novianti, Chofifah Alfin, Muhammad Khudzaifah, and Mohammad Nafie Jauhari. "Kriptografi Hibrida Cipher Block Chaining (CBC) dan Merkle-Hellman Knapsack untuk Pengamanan Pesan Teks." Jurnal Riset Mahasiswa Matematika 3, no. 1 (2023): 10–25. http://dx.doi.org/10.18860/jrmm.v3i1.22292.

Full text
Abstract:
A secret message is a message that can only be seen by those who are entitled. In its delivery, a procedure is needed to keep the secret message secure, which is called cryptography. This research uses hybrid cryptography Cipher Block Chaining (CBC) and Merkle-Hellman Knapsack. The purpose of this research is to find out the encryption and decryption process of hybrid cryptography Cipher Block Chaining (CBC) and Merkle-Hellman Knapsack. The stages in this research use a qualitative approach with the library research method. In the encryption process with CBC, plaintext is encrypted first and t
APA, Harvard, Vancouver, ISO, and other styles
13

Nugroho, Widhi Bagus, Ajib Susanto, Christy Atika Sari, Eko Hari Rachmawanto, and Mohamed Doheir. "A ROBUST AND IMPERCEPTIBLE FOR DIGITAL IMAGE ENCRYPTION USING CHACHA20." Jurnal Teknik Informatika (Jutif) 5, no. 2 (2024): 397–404. https://doi.org/10.52436/1.jutif.2024.5.2.1470.

Full text
Abstract:
In the current era, data security is mandatory because it protects our personal data from being used by irresponsible people. The objective of this research is to show the robustness of the method we propose to encrypt images using the chacha20 algorithm which is included in the symmetric encryption cryptography technique and uses one key for both encryption and decryption processes. we use the encryption method by reading the bits from a digital image which is processed using the chacha20 algorithm to get the results of the digital image encryption. The results of this study indicate that the
APA, Harvard, Vancouver, ISO, and other styles
14

Lee, Sang-Un, and Myeong-Bok Choi. "Integer Factorization for Decryption." Journal of the Institute of Webcasting, Internet and Telecommunication 13, no. 6 (2013): 221–28. http://dx.doi.org/10.7236/jiibc.2013.13.6.221.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Ceruzzi, P. "Decryption Day by Day." Science 264, no. 5161 (1994): 990–92. http://dx.doi.org/10.1126/science.264.5161.990.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Butenas, Saulius, and Jolanta Krudysz-Amblo. "Decryption of tissue factor." Thrombosis Research 129 (May 2012): S18—S20. http://dx.doi.org/10.1016/j.thromres.2012.02.022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Balasubramanian, Dr Kannan, M. Arun, and Dr K. R. Sekar. "An Improved RSA Algorithm for Enhanced Security." Indian Journal of Cryptography and Network Security 2, no. 2 (2022): 1–4. http://dx.doi.org/10.54105/ijcns.b1421.112222.

Full text
Abstract:
The security of the Rivest-Shamir-Adelman (RSA) public key algorithm depends on the difficulty of factoring the modulus calculated by multiplying two large prime numbers. The usefulness of the RSA public key algorithm lies in using one key for encryption and another key for decryption. However, a poor choice of the keys used in encryption and decryption can affect the security of the RSA cryptosystem. Many proposals have been made to modify the RSA cryptosystem in such a way that the attacks on the RSA cryptosystem can be overcome. In this article, we propose concealing the publicly disclosed
APA, Harvard, Vancouver, ISO, and other styles
18

Dr., Kannan Balasubramanian, Arun M., and K. R. Sekar Dr. "An Improved RSA Algorithm for Enhanced Security." Indian Journal of Cryptography and Network Security (IJCNS) 2, no. 2 (2022): 1–4. https://doi.org/10.54105/ijcns.B1421.112222.

Full text
Abstract:
<strong>Abstract: </strong>The security of the Rivest-Shamir-Adelman (RSA) public key algorithm depends on the difficulty of factoring the modulus calculated by multiplying two large prime numbers. The usefulness of the RSA public key algorithm lies in using one key for encryption and another key for decryption. However, a poor choice of the keys used in encryption and decryption can affect the security of the RSA cryptosystem. Many proposals have been made to modify the RSA cryptosystem in such a way that the attacks on the RSA cryptosystem can be overcome. In this article, we propose conceal
APA, Harvard, Vancouver, ISO, and other styles
19

Levchenko, V., I. Shulga, А. Romanyuk, and L. Bezverkha. "USE OF REMOTE GEOINFORMATION TECHNOLOGIES FOR FOREST PATHOLOGY MONITORING IN THE ZHYTOMYR POLISSYA." Innovative Solution in Modern Science 2, no. 38 (2020): 20. http://dx.doi.org/10.26886/2414-634x.2(38)2020.3.

Full text
Abstract:
Topical issues of remote assessment of the forest pathological condition of forests are substantiated, in particular, it is emphasized that today this type of decryption is the least developed link in the section of forest decoding. This is due to the unstable manifestation and diagnosis on the materials of aeronautical surveys of signs of deciphering trees and plantations of varying degrees of attenuation and drying. Forest decoding of aerospace imagery materials today is the process of recognizing aerial objects depicted on aerospace images and establishing their quantitative and qualitative
APA, Harvard, Vancouver, ISO, and other styles
20

Abu-Faraj, Mua’ad, Abeer Al-Hyari, and Ziad Alqadi. "A DUAL APPROACH TO DIGITAL AUDIO SIGNAL CRYPTOGRAPHY." Journal of Southwest Jiaotong University 57, no. 1 (2022): 24–33. http://dx.doi.org/10.35741/issn.0258-2724.57.1.3.

Full text
Abstract:
Nowadays, the digital audio file is considered one of the most important digital data that requires good protection because it may be confidential or of a special nature. This research paper will present an easy-to-implement method to apply the protection process to a very high degree. We will implement this method to prove its efficiency by reducing the encryption and decryption time and thus increasing the throughput of the encryption process. We will calculate the quality parameters to ensure that the quality of the speech is achieved during the encryption and decryption phases passed on th
APA, Harvard, Vancouver, ISO, and other styles
21

Smelova, Svetlana Stanislavovna, and Mikhail Sergeevich Zverkov. "Using of remote sensing data and field surveys to solve the problems of geobotanical mapping of reclaimed lands." Ekologiya i stroitelstvo, no. 2 (June 25, 2022): 23–33. https://doi.org/10.35688/2413-8452-2022-02-003.

Full text
Abstract:
It is noted that geobotanical research is important among other various surveys carried out on reclaimed lands. With the increased availability of digital tools, it became possible to increase the information content and accuracy of these studies in solving mapping problems. Geobotanical surveys on unused lands and lands in unsatisfactory condition are especially relevant. The authors examined two landsof unused reclamation systems using near remote sensing of the Earth. Unmanned aerial vehicle «Hubsan Zino PRO» was used to obtain data. Geobotanical descriptions of vegetation are made in situ
APA, Harvard, Vancouver, ISO, and other styles
22

Gao, Ming Hu, and Hong Yuan Huang. "A New Efficient Variant of the Batch RSA Cryptosystem." Advanced Materials Research 756-759 (September 2013): 2660–62. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2660.

Full text
Abstract:
This paper aims at speeding up Batch RSA decryption. The performance of Batch RSA decryption has directs relationship with the efficiency of the full-sized modular exponentiation implementation in the Exponentiation Phase. This paper proposes a variant (BS1PRSA-Batch RSA-S1 Multi-Power RSA) to improve the Batch RSA decryption performance. The experimental results show that the speed of the decryption has been substantially improved.
APA, Harvard, Vancouver, ISO, and other styles
23

Jin, Zhihong. "A Brief Discussion on Data Encryption and Decryption Technology and Its Applications." Journal of Electronic Research and Application 9, no. 2 (2025): 159–65. https://doi.org/10.26689/jera.v9i2.9915.

Full text
Abstract:
With the rapid development of information technology, data security issues have received increasing attention. Data encryption and decryption technology, as a key means of ensuring data security, plays an important role in multiple fields such as communication security, data storage, and data recovery. This article explores the fundamental principles and interrelationships of data encryption and decryption, examines the strengths, weaknesses, and applicability of symmetric, asymmetric, and hybrid encryption algorithms, and introduces key application scenarios for data encryption and decryption
APA, Harvard, Vancouver, ISO, and other styles
24

Gao, Ronghai, Jiwen Zeng, and Lunzhi Deng. "An efficient certificateless multi-receiver threshold decryption scheme." RAIRO - Theoretical Informatics and Applications 53, no. 1-2 (2019): 67–84. http://dx.doi.org/10.1051/ita/2019001.

Full text
Abstract:
Threshold decryption allows only quorum cooperate users to decrypt ciphertext encrypted under a public key. However, such threshold decryption scheme cannot be applied well in this situation where all users have their public and private key pairs, but do not share any private keys corresponding to the public keys, such as mobile network featured with dynamic character. The direct way to achieve threshold decryption in this case is to divide the message into several pieces and then encrypt these pieces with the public keys of different users. However, this is very inefficient. Multireceiver thr
APA, Harvard, Vancouver, ISO, and other styles
25

Ruan, Wei Hua, and Qing Sheng Hu. "A Kind of Logarithmic Function Hardware Encryptor and Decryptor." Applied Mechanics and Materials 427-429 (September 2013): 2956–59. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2956.

Full text
Abstract:
This paper presents the realization of a kind of hardware encryptor and decryptor, which is based on Logarithmic Function principle. It shows how to design the encryption circuit and the decryption circuit by the sequential circuit. It had been designed in VHDL and simulated by Modelsim software, and then synthesized as well as realized on the FPGA chip EP2C5T144 by QuartusII software, last finished the test.
APA, Harvard, Vancouver, ISO, and other styles
26

Vagizov, M. R., S. Y. Stepanov, Y. A. Petrov, and A. Y. Sidorenko. "Method of decryption and inventory of forest plantations by means of GIS AutoCad Map." Geoinformatika, no. 4 (2020): 20–27. http://dx.doi.org/10.47148/1609-364x-2020-4-20-27.

Full text
Abstract:
The authors' article discusses the proposed methodology for the inventory of woody plants using the tools of geographic information systems. The tasks of the study included a tree inventory of plantations in the city, this task is of practical interest in the management and development of economic activities in an urbanized territory. To conduct sub-river decryption, the authors carried out work on creating thematic layers for each of the identified trees. The article describes a step-by-step methodology for formalizing the features of plantations within the framework of the system under consi
APA, Harvard, Vancouver, ISO, and other styles
27

Song, Qinghua, Samira Khadir, Stéphane Vézian, et al. "Printing polarization and phase at the optical diffraction limit: near- and far-field optical encryption." Nanophotonics 10, no. 1 (2020): 697–704. http://dx.doi.org/10.1515/nanoph-2020-0352.

Full text
Abstract:
AbstractSecuring optical information to avoid counterfeiting and manipulation by unauthorized persons and agencies requires innovation and enhancement of security beyond basic intensity encryption. In this paper, we present a new method for polarization-dependent optical encryption that relies on extremely high-resolution near-field phase encoding at metasurfaces, down to the diffraction limit. Unlike previous intensity or color printing methods, which are detectable by the human eye, analog phase decoding requires specific decryption setup to achieve a higher security level. In this work, qua
APA, Harvard, Vancouver, ISO, and other styles
28

Pronika, Pronika, and S. S. Tyagi. "Performance analysis of encryption and decryption algorithm." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 2 (2021): 1030–38. https://doi.org/10.11591/ijeecs.v23.i2.pp1030-1038.

Full text
Abstract:
In this tumultuous 21st century, we are surrounding by lots of applications such as social media websites all over the internet or this era can also define as digital era in which everything is accessible over the internet. There are billions of internet users all over the world and they share their information over the same and because of this lots of people intentionally trying to steal the confidential data of other people, so it is always advisable to share and store data in encrypted form. In this paper, we discuss different encryption and decryption algorithms and compare them with respe
APA, Harvard, Vancouver, ISO, and other styles
29

Chiriac, Liubomir, Aurel Danilov, and Violeta Bogdanova. "Encryption and decryption algorithm based on the Latin groupoid isotopes." Acta et commentationes Ştiinţe Exacte şi ale Naturii 14, no. 2 (2022): 117–31. http://dx.doi.org/10.36120/2587-3644.v14i2.117-131.

Full text
Abstract:
This paper studies encryption and decryption algorithm, using isotopes of Latin groupoid. Cryptographic algorithms are computationally intensive processes which consume large amount of CPU time and space during the process of encryption and decryption. The goal of this paper is to study the encryption and decryption algorithm with the help of the concept of Latin groupoid and notion of isotopes. The proposed algorithm is safe in the implementation process and can be verified without much difficulty. An example of encryption and decryption based on the atin groupoid and the concept of isotopy i
APA, Harvard, Vancouver, ISO, and other styles
30

Brovets, Andrey I. "The deciphering stimulus of a compound word: the problem of definition and description." Russian Language Studies 17, no. 4 (2019): 487–501. http://dx.doi.org/10.22363/2618-8163-2019-17-4-487-501.

Full text
Abstract:
The article discusses the concept of abbreviated decryption of stimulus, which refers to a method of rolling out a contracted construct abbreviation in an equivalent phrase. The study is relevant because it implements and describes a new approach to abbreviation interpretation, stating that a complex word in a synchronous section of the language usually corresponds not to not, but to several equivalent phrases that appear as a result of actualizing alternative decryption stimuli of a contracted abbreviation construct in the text, while existing dictionaries of complex words give only one phras
APA, Harvard, Vancouver, ISO, and other styles
31

Zhang, Kai, Yanping Li, Yun Song, Laifeng Lu, Tao Zhang, and Qi Jiang. "A Traceable and Revocable Multiauthority Attribute-Based Encryption Scheme with Fast Access." Security and Communication Networks 2020 (December 22, 2020): 1–14. http://dx.doi.org/10.1155/2020/6661243.

Full text
Abstract:
Multiauthority ciphertext-policy attribute-based encryption (MA-CP-ABE) is a promising technique for secure data sharing in cloud storage. As multiple users with same attributes have same decryption privilege in MA-CP-ABE, the identity of the decryption key owner cannot be accurately traced by the exposed decryption key. This will lead to the key abuse problem, for example, the malicious users may sell their decryption keys to others. In this paper, we first present a traceable MA-CP-ABE scheme supporting fast access and malicious users’ accountability. Then, we prove that the proposed scheme
APA, Harvard, Vancouver, ISO, and other styles
32

Pronika, Pronika, and S. S. Tyagi. "Performance analysis of encryption and decryption algorithm." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 2 (2021): 1030. http://dx.doi.org/10.11591/ijeecs.v23.i2.pp1030-1038.

Full text
Abstract:
&lt;p class="Abstract"&gt;In this tumultuous 21st century, we are surrounding by lots of applications such as social media websites all over the internet or this era can also define as digital era in which everything is accessible over the internet. There are billions of internet users all over the world and they share their information over the same and because of this lots of people intentionally trying to steal the confidential data of other people, so it is always advisable to share and store data in encrypted form. In this paper, we discuss different encryption and decryption algorithms a
APA, Harvard, Vancouver, ISO, and other styles
33

Chen, Chao, Hongying Zhang, and Bin Wu. "Image Encryption Based on Arnod Transform and Fractional Chaotic." Symmetry 14, no. 1 (2022): 174. http://dx.doi.org/10.3390/sym14010174.

Full text
Abstract:
An image encryption and decryption algorithm based on Arnod transform and fractional chaos is proposed in this work for solving the problem that the encrypted image is easily cracked and the content of the decrypted image is distorted. To begin with, the Arnold transform is used to encrypt, so that the spatial confidence of the original image has been comprehensively disturbed. Secondly, the XOR involving the fractional order chaotic sequence is used to encrypt. The key sequence is dynamically generated to ensure the randomness and difference of key generation. When decryption is required, the
APA, Harvard, Vancouver, ISO, and other styles
34

Ayush, Mittal, and Kumar Gupta Ravindra. "A Cryptographic Technique Involving Finite Fields and Logical Operators." Indian Journal of Science and Technology 13, no. 3 (2020): 316–28. https://doi.org/10.17485/ijst/2020/v13i03/148904.

Full text
Abstract:
Abstract <strong>Objectives:</strong>&nbsp;The aim of this study is to propose a new encryption/ decryption technique which involves logical operators and finite field. <strong>Methods/statistical analysis:</strong>&nbsp;The study proposes a new method for encrypting/decrypting messages which use logical operator XOR and finite field. The method involves sharing common keys between sender and receiver. Then converting plain text into ASCII values bit-form. XORing this with random matrix and then using finite field GF (2^5) for converting it into polynomial elements. These elements are then use
APA, Harvard, Vancouver, ISO, and other styles
35

Al-Fayoumi, Mohammed, and Sttar Aboud. "Blind Decryption and Privacy Protection." American Journal of Applied Sciences 2, no. 4 (2005): 873–76. http://dx.doi.org/10.3844/ajassp.2005.873.876.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Hewage, Chaminda, Ambikesh Jayal, Glenn Jenkins, and Ryan J. Brown. "A Learned Polyalphabetic Decryption Cipher." SNE Simulation Notes Europe 28, no. 4 (2018): 141–48. http://dx.doi.org/10.11128/sne.28.tn.10441.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

SIROMONEY, RANI, K. G. SUBRAMANIAN, and P. J. ABISHA. "ENCRYPTION-DECRYPTION TECHNIQUES FOR PICTURES." International Journal of Pattern Recognition and Artificial Intelligence 03, no. 03n04 (1989): 497–503. http://dx.doi.org/10.1142/s0218001489000371.

Full text
Abstract:
Language theoretic public key cryptosystems for strings and pictures are discussed. Two methods of constructing public key cryptosystems for the safe transmission or storage of chain code pictures are presented; the first one encrypts a chain code picture as a string and the second one as a two-dimensional array.
APA, Harvard, Vancouver, ISO, and other styles
38

Cheatham, Tom. "MESSAGE DECRYPTION AND SPELLING CHECKERS." Cryptologia 11, no. 2 (1987): 115–18. http://dx.doi.org/10.1080/0161-118791861901.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

VS, Barath. "Secured Folder Encryption and Decryption." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 121–29. http://dx.doi.org/10.22214/ijraset.2024.64953.

Full text
Abstract:
In today's digital world, when sensitive data is routinely targeted by thieves, strong encryption technologies are critical for preventing breaches and ransomware attacks. Our research solves this need by creating a Secure Folder Encryption System that employs AES-GCM (Advanced Encryption Standard - Galois/Counter Mode) and HMAC (Hash-based Message Authentication Code) to secure data confidentiality and integrity when stored on cloud servers. Drawing on research on ECG image file encryption using ECDH and AES-GCM, we choose AES-GCM for its high resistance to manipulation and unauthorized acces
APA, Harvard, Vancouver, ISO, and other styles
40

Encinas, L. Hernández, J. Muñoz Masqué, and A. Queiruga Dios. "Large decryption exponents in RSA." Applied Mathematics Letters 16, no. 3 (2003): 293–95. http://dx.doi.org/10.1016/s0893-9659(03)80046-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Millen, Jonathan. "On the freedom of decryption." Information Processing Letters 86, no. 6 (2003): 329–33. http://dx.doi.org/10.1016/s0020-0190(03)00211-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Rao, L. Vijaya Mohan. "Tissue factor mechanisms of decryption." Frontiers in Bioscience E4, no. 4 (2012): 1513–27. http://dx.doi.org/10.2741/e477.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Devi, SistlaVasundhara, and Harika Devi Kotha. "AES encryption and decryption standards." Journal of Physics: Conference Series 1228 (May 2019): 012006. http://dx.doi.org/10.1088/1742-6596/1228/1/012006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Nayak, Nikhilesh, Akshay Chandak, Nisarg Shah, and B. Karthikeyan. "Encryption and decryption using FPGA." IOP Conference Series: Materials Science and Engineering 263 (November 2017): 052030. http://dx.doi.org/10.1088/1757-899x/263/5/052030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Bhargava, Puvvula, and Kuppam Hari Kishan. "144-BIT Encryption/Decryption Technique." International Journal of Computer Applications 1, no. 21 (2010): 67–74. http://dx.doi.org/10.5120/53-647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Rathi, Amit, Raj Saini, Abhinav Mishra, Vivek Kumar Sharma, and Jagbeer Singh. "File Encryption and Decryption Software." Journal of Computer Based Parallel Programming 8, no. 1 (2023): 5–13. http://dx.doi.org/10.46610/jocpp.2023.v08i01.002.

Full text
Abstract:
Since the advent of information technology (the internet) a few decades ago, there have been many changes made to the way information is shared and moved between people, between nations, and throughout the whole world. Information security experts are growing worried about how to solve the issue of information "theft," which has been for a long. Today, it is clear that information security is the solution due to the present spread of several recently developed cryptanalysis techniques. To create a file that can be hashed and firmly decrypted by reliable file storage software, our technique in
APA, Harvard, Vancouver, ISO, and other styles
47

Ladda, Priyanka, Shyama Yadav, and Shashank Vyas. "Decryption and Encryption of Data." Journal of Nonlinear Analysis and Optimization 14, no. 01 (2023): 86–93. http://dx.doi.org/10.36893/jnao.2023.v14i1.087-093.

Full text
Abstract:
In the digital age, the security of data has become a paramount concern. This research paper explores the fundamental concepts and practical applications of encryption and decryption as essential tools for ensuring data security. It delves into the historical evolution of encryption methods and the mathematical foundations of cryptographic algorithms. The paper provides a comprehensive overview of popular encryption algorithms, key management techniques, and the role of encryption in protecting data at rest, in transit, and during processing. Decryption techniques and potential vulnerabilities
APA, Harvard, Vancouver, ISO, and other styles
48

Salmanov, V. "POLYMORPHİC ENCRYPTİON AND DECRYPTİON ALGORİTHMS." Sciences of Europe, no. 98 (August 8, 2022): 76–79. https://doi.org/10.5281/zenodo.6973815.

Full text
Abstract:
Based on the analysis, an algorithm for improving the development of automated distance learning systems is considered. The algorithm, designed to be integrated into existing educational systems, has been designed to be supported during use outside of robust computing systems. When preparing software based on the proposed algorithm, new data encryption technologies can be used. This completely eliminates the need for hardware.
APA, Harvard, Vancouver, ISO, and other styles
49

Shivangi, Wadehra, Goel Shivam, and Sengar Nidhi. "AES Algorithm Encryption and Decryption." International Journal of Trend in Scientific Research and Development 2, no. 3 (2019): 1075–77. https://doi.org/10.31142/ijtsrd11221.

Full text
Abstract:
Advanced Encryption Standard AES algorithm is one of the most common and widely used symmetric block cipher algorithm. This algorithm has its own particular structure to encrypt and decrypt sensitive data and is applied in hardware and software, all over the world. It is extremely difficult for hackers to get the real data when encrypting by AES algorithm. In AES algorithm, encryption and decryption involves a number of rounds that depends on the length of the key and the number of block columns. So, to improve the strength of the AES the number of rounds is increased. Till date there is not a
APA, Harvard, Vancouver, ISO, and other styles
50

Kumar, Dilip, Manoj Kumar, and Gaurav Gupta. "An Outsourced Decryption ABE Model using ECC in Internet of Things." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 29, no. 06 (2021): 949–64. http://dx.doi.org/10.1142/s0218488521500422.

Full text
Abstract:
Internet of Things (IoT) is a modern technology that is applicable almost everywhere nowadays. Everything is connected to the Internet in the modern digital era. IoT is a collection of things that are interconnected to share information. Devices connected to IoT networks have some limitations in performing heavy computational tasks because of the availability of less computational and battery power. Attribute Based Encryption (ABE) is a modern public-key cryptographic technique that provides privacy with access control. The bilinear map is an expensive operation that is used in most of the ABE
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!