Academic literature on the topic 'Encryption and Decryption'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Encryption and Decryption.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Encryption and Decryption"

1

Wadehra, Shivangi, Shivam Goel, and Nidhi Sengar. "AES Algorithm: Encryption and Decryption." International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (April 30, 2018): 1075–77. http://dx.doi.org/10.31142/ijtsrd11221.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jo, Suhyung, Sang Su Lee, and Doo Ho Choi. "Data Preprocessor for Order Preserving Encryption." Applied Mechanics and Materials 752-753 (April 2015): 1356–59. http://dx.doi.org/10.4028/www.scientific.net/amm.752-753.1356.

Full text
Abstract:
Sensitive data such as personal telephone number, address, social security number at database is prevented to access by SQL search query. In order to prevent security problems it needs to encrypt database. Order preserving encryption (OPE) is a method of encrypting data so that it's possible to make efficient inequality comparisons on the encrypted items without decrypting them. OPE data of database is available to make index without decryption. In this paper, the data preprocessor by reducing plaintext range, the performance of OPE is increased and sensitive data are protected at database.
APA, Harvard, Vancouver, ISO, and other styles
3

Ruan, Wei Hua, and Qing Sheng Hu. "A Kind of Logarithmic Function Hardware Encryptor and Decryptor." Applied Mechanics and Materials 427-429 (September 2013): 2956–59. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2956.

Full text
Abstract:
This paper presents the realization of a kind of hardware encryptor and decryptor, which is based on Logarithmic Function principle. It shows how to design the encryption circuit and the decryption circuit by the sequential circuit. It had been designed in VHDL and simulated by Modelsim software, and then synthesized as well as realized on the FPGA chip EP2C5T144 by QuartusII software, last finished the test.
APA, Harvard, Vancouver, ISO, and other styles
4

Pronika, Pronika, and S. S. Tyagi. "Performance analysis of encryption and decryption algorithm." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 2 (August 1, 2021): 1030. http://dx.doi.org/10.11591/ijeecs.v23.i2.pp1030-1038.

Full text
Abstract:
<p class="Abstract">In this tumultuous 21st century, we are surrounding by lots of applications such as social media websites all over the internet or this era can also define as digital era in which everything is accessible over the internet. There are billions of internet users all over the world and they share their information over the same and because of this lots of people intentionally trying to steal the confidential data of other people, so it is always advisable to share and store data in encrypted form. In this paper, we discuss different encryption and decryption algorithms and compare them with respect to time take by these algorithms for encrypting and decrypting different sizes of files.</p>
APA, Harvard, Vancouver, ISO, and other styles
5

Bozduman, Hanife Çağıl, and Erkan Afacan. "Simulation of a Homomorphic Encryption System." Applied Mathematics and Nonlinear Sciences 5, no. 1 (April 10, 2020): 479–84. http://dx.doi.org/10.2478/amns.2020.1.00046.

Full text
Abstract:
AbstractCryptology is defined as the science of making communication incomprehensible to third parties who have no right to read and understand the data or messages. Cryptology consists of two parts, namely, cryptography and cryptanalysis. Cryptography analyzes methods of encrypting messages, and cryptanalysis analyzes methods of decrypting encrypted messages. Encryption is the process of translating plaintext data into something that appears to be random and meaningless. Decryption is the process of converting this random text into plaintext. Cloud computing is the legal transfer of computing services over the Internet. Cloud services let individuals and businesses to use software and hardware resources at remote locations. Widespread use of cloud computing raises the question of whether it is possible to delegate the processing of data without giving access to it. However, homomorphic encryption allows performing computations on encrypted data without decryption. In homomorphic encryption, only the encrypted version of the data is given to the untrusted computer to process. The computer will perform the computation on this encrypted data, without knowing anything on its real value. Finally, it will send back the result, and whoever has the proper deciphering key can decrypt the cryptogram correctly. The decrypted result will be equal to the intended computed value. In this paper, homomorphic encryption and their types are reviewed. Also, a simulation of somewhat homomorphic encryption is examined.
APA, Harvard, Vancouver, ISO, and other styles
6

L, Vinothkumar, and Balaji V. "Encryption and Decryption Technique Using Matrix Theory." Journal of Computational Mathematica 3, no. 2 (December 30, 2019): 1–7. http://dx.doi.org/10.26524/cm49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kaur, Kulwinder. "Performance Evaluation of Ciphers Using CRYPTOOL 2.0." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (August 1, 2012): 39–43. http://dx.doi.org/10.24297/ijct.v3i1a.2727.

Full text
Abstract:
Cryptography is an emerging technology, which is important for network security. Research on cryptography is still in its developing stages and considerable research effort is required. This paper includes the complete step by step implementation of advance encryption technique, i.e. encrypting and decrypting 128 bit data using the AES and its modification for enhanced reliability and security. The encryption process consists of the combination of various classical techniques such as substitution, rearrangement and transformation encoding technique. The encryption and decryption module include the key expansion module which generates the key for all iterations. The modification includes the addition of an arithmetic operation and a route transposition cipher in the attacks iterative rounds. The key expansion module is extended to double the number of iterative rounds in order to increase its immunity against unauthorized attacks.
APA, Harvard, Vancouver, ISO, and other styles
8

Aminudin, Nur, Andino Maseleno, Shankar K, S. Hemalatha, K. Sathesh kumar, Fauzi ., Rita Irviani, and Muhamad Muslihudin. "Nur Algorithm on Data Encryption and Decryption." International Journal of Engineering & Technology 7, no. 2.26 (May 7, 2018): 109. http://dx.doi.org/10.14419/ijet.v7i2.26.14363.

Full text
Abstract:
Security is a priority in information system, especially in the exchange of data that are important or confidential. The information to be given to the party entitled to the information must be properly safeguarded, don’t fall into the other hands who have no right to such information. One way to maintain the security of information exchanged in a system can be done using cryptographic techniques. Cryptography is the art and science to hide information from third parties. In cryptography a person who has a private key can convert plaintext data into unique and unreadable data (ciphertext) and can convert existing ciphertext into plaintext form by using its private key. System development (System Development Lifecycle) can mean to construct a new system to replace old system, combined with prototyping technique to build a cryptographic system using Nur algorithm which is implemented using programming language used is assembly (MASM32). In Nur Aminuddin's Encryptor there are two data-reading techniques namely encryption technique (the technique of converting data from the original into unreadable code) and decryption technique (the techniques of reading unreadable codes become readable) Encryption technique is built by applying technique of modern cryptography which holds secrecy on the symmetric key, so the security of encryption depends only on the key and does not depend on whether the algorithm is known to people or not.
APA, Harvard, Vancouver, ISO, and other styles
9

SIROMONEY, RANI, K. G. SUBRAMANIAN, and P. J. ABISHA. "ENCRYPTION-DECRYPTION TECHNIQUES FOR PICTURES." International Journal of Pattern Recognition and Artificial Intelligence 03, no. 03n04 (December 1989): 497–503. http://dx.doi.org/10.1142/s0218001489000371.

Full text
Abstract:
Language theoretic public key cryptosystems for strings and pictures are discussed. Two methods of constructing public key cryptosystems for the safe transmission or storage of chain code pictures are presented; the first one encrypts a chain code picture as a string and the second one as a two-dimensional array.
APA, Harvard, Vancouver, ISO, and other styles
10

Bhargava, Puvvula, and Kuppam Hari Kishan. "144-BIT Encryption/Decryption Technique." International Journal of Computer Applications 1, no. 21 (February 25, 2010): 67–74. http://dx.doi.org/10.5120/53-647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Encryption and Decryption"

1

Manteena, Rajender. "A VHDL Implemetation of the Advanced Encryption Standard-Rijndael Algorithm." Scholar Commons, 2004. https://scholarcommons.usf.edu/etd/1149.

Full text
Abstract:
The National Institute of Standards and Technology (NIST) has initiated a process to develop a Federal information Processing Standard (FIPS) for the Advanced Encryption Standard (AES), specifying an Advanced Encryption Algorithm to replace the Data Encryption standard (DES) the Expired in 1998. NIST has solicited candidate algorithms for inclusion in AES, resulting in fifteen official candidate algorithms of which Rijndael was chosen as the Advanced Encryption Standard. The Advanced Encryption Standard can be programmed in software or built with pure hardware. However Field Programmable Gate Arrays (FPGAs) offer a quicker, more customizable solution. This research investigates the AES algorithm with regard to FPGA and the Very High Speed Integrated Circuit Hardware Description language (VHDL). Altera Max+plus II software is used for simulation and optimization of the synthesizable VHDL code. All the transformations of both Encryptions and Decryption are simulated using an iterative design approach in order to minimize the hardware consumption. Altera ACEX1K Family devices are utilized for hardware evaluation.
APA, Harvard, Vancouver, ISO, and other styles
2

Kundur, Abhinay. "Digital and Analog Signal Encryption and Decryption in Mid RF Range Using Hybrid Acousto-Optic Chaos." University of Dayton / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1336100009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Greinsmark, Carl. "Ransomware." Thesis, Högskolan Kristianstad, Fakulteten för naturvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-20695.

Full text
Abstract:
This thesis researches different ransomwares, how we can stop them and how their threat vectors work. It is important to notice that when solving one ransomware doesn’t solve the next incoming one. In this thesis we investigate six different ransomwares that spread between 2016-2019. We investigate the encryption methods, the different threat vectors, infection spreading and how to prevent from them by doing a theoretical and practical study. The results show that after infection of a ransomware, it encrypts the data instantaneously on the system. Fortunately, to keep information safe there are few prevention methods such as anti-virus software and a few prototypes created that is not currently released one is called PayBreak for Windows 7 and tests to find a solution through flash memory.
APA, Harvard, Vancouver, ISO, and other styles
4

Merz, Doug, and Bruce Maples. "Encrypt/Decrypt COMSEC Unit for Space-based Command and Telemetry Applications." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/605565.

Full text
Abstract:
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada
This paper describes the system-level architecture and design concept of a communications security (COMSEC) equipment intended for space-based low data rate (< 1 Mbps) command and telemetry applications. The COMSEC Unit is a stand-alone piece of equipment which provides decryption of uplink command and control information and encryption of downlink telemetry data. The system-level architecture is described followed by an overview of the digital design concepts and a discussion of applications. Finally, although specifically targeted for narrowband command and telemetry applications, this design approach is flexible enough to accommodate other algorithms of choice as well as operate in higher data rate applications.
APA, Harvard, Vancouver, ISO, and other styles
5

Samuel, David. "RFID security in door locks." Thesis, Linköping University, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-12186.

Full text
Abstract:

Radio frequency identification, RFID is a technology that is used in many fields including locks. The unlimited access to the reader and the transponder has resulted in severe security weaknesses and made it possible to apply different attacks. To classify door locks as secure they must at least fulfil two main criteria: the first is the use of a challenge-response authentication protocol and the second is to deploy sophisticated and secure algorithms.

MiFare classic and KeeLoq are two widely applied technologies that are still in use in many security critical applications and are considered to be secure but which have been broken by cryptanalysis and with modest efforts and cost.

How secure a certain solution is depends on how expensive it is to buy the equipment that can break the system and reveal the secret key and how secure a lock should be depends on the value of what it is protecting.

The dropping price of powerful computers and the availability of security related information on the web will lead to an increase of the number of attacks on different systems.

By the time this thesis is published those locks evaluated are not secure enough, to overcome the security shortage some improvements have to be made such as: the use of sophisticated algorithms, the use of longer key of at least 128-bit, the use of non-deterministic random number generators and the use of pure hardware solutions both in the receiver and the transmitter to reduce leakage.

APA, Harvard, Vancouver, ISO, and other styles
6

Chaparala, Suman Krishna. "Secure Encryption and Decryption by Aperture Variations of a Photodetector in an Acousto-Optic Bragg Cell." University of Dayton / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1468527741.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kandi, Jayavardhan R. "Embedded Cryptography: An Analysis and Evaluation of Performance and Code Optimization Techniques for Encryption and Decryption in Embedded Systems." [Tampa, Fla.] : University of South Florida, 2003. http://purl.fcla.edu/fcla/etd/SFE0000151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jayapal, Ranjith. "Biometric encryption system for increased security." UNF Digital Commons, 2017. http://digitalcommons.unf.edu/etd/746.

Full text
Abstract:
Security is very important in present day life. In this highly-interconnected world, most of our daily activities are computer based, and the data transactions are protected by passwords. These passwords identify various entities such as bank accounts, mobile phones, etc. People might reuse the same password, or passwords related to an individual that can lead to attacks. Indeed, remembering several passwords can become a tedious task. Biometrics is a science that measures an individual’s physical characteristics in a unique way. Thus, biometrics serves as a method to replace the cumbersome use of complex passwords. Our research uses the features of biometrics to efficiently implement a biometric encryption system with a high level of security.
APA, Harvard, Vancouver, ISO, and other styles
9

Al-saedi, Mohammed Abdullah. "Examination of Acousto-Optic Chaos and Application to RF Signal Encryption and Recovery." University of Dayton / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1337808954.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Luque, González Jorge, and Fernandez Ignacio Arenchaga. "Data Encryption on a Network." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-9352.

Full text
Abstract:
In this project you can find a study about different encryption algorithms, which are use to safeguard the information on messages over the network. We have developed a client-server application which will send information through the network which has to be secured. There are two kinds of encryption algorithms, the symmetric and the asymmetric key algorithms. Both were used to establish the communication, the asymmetric algorithm (RSA) is used to set up a symmetric key and then, all the communication process is done only with the symmetric algorithm (Blowfish).
En este proyecto encontraras un estudio sobre diferentes algoritmos de encriptación, que son usados para salvaguardar la información en mensajes por la red. Además hemos desarrollado una aplicación cliente-servidor que enviara información a través de la red de forma segura. Hay dos tipos de algoritmos de encriptación, los simétricos y los asimétricos. Ambos tipos de algoritmos son utilizados para establecer la comunicación, el asimétrico (RSA) es utilizado para establecer la clave del simétrico y a partir de entonces se utilizara exclusivamente el algoritmo simétrico (Blowfish).
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Encryption and Decryption"

1

Muniraj, Inbarasan, and John T. Sheridan. Optical Encryption and Decryption. SPIE, 2019. http://dx.doi.org/10.1117/3.2523506.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Martin, Keith M. Public-Key Encryption. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0005.

Full text
Abstract:
In this chapter, we introduce public-key encryption. We first consider the motivation behind the concept of public-key cryptography and introduce the hard problems on which popular public-key encryption schemes are based. We then discuss two of the best-known public-key cryptosystems, RSA and ElGamal. For each of these public-key cryptosystems, we discuss how to set up key pairs and perform basic encryption and decryption. We also identify the basis for security for each of these cryptosystems. We then compare RSA, ElGamal, and elliptic-curve variants of ElGamal from the perspectives of performance and security. Finally, we look at how public-key encryption is used in practice, focusing on the popular use of hybrid encryption.
APA, Harvard, Vancouver, ISO, and other styles
3

Redbooks, IBM. Mqseries Security: Example of Using a Channel Security Exit, Encryption and Decryption. Ibm, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Decrypting the Encryption Debate. Washington, D.C.: National Academies Press, 2018. http://dx.doi.org/10.17226/25010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

National Academies of Sciences, Engineering, and Medicine. Decrypting the Encryption Debate: A Framework for Decision Makers. National Academies Press, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Redfield, Marc. Shibboleth. Fordham University Press, 2020. http://dx.doi.org/10.5422/fordham/9780823289066.001.0001.

Full text
Abstract:
In the Book of Judges, the Gileadites use the word shibboleth to target and kill members of a closely related tribe, the Ephraimites, who cannot pronounce the initial shin phoneme. In modern European languages, shibboleth has come to mean a hard-to-falsify sign that winnows identities and establishes and confirms borders; it has also acquired the ancillary meanings of slogan or cliché. The semantic field of shibboleth thus seems keyed to the waning of the logos in an era of technical reproducibility—to the proliferation of technologies and practices of encryption, decryption, exclusion and inclusion that saturate modern life. In the context of an unending refugee crisis and a general displacement, monitoring and quarantining of populations within a global regime of technics, Paul Celan’s subtle yet fierce reorientation of shibboleth merits scrupulous reading. Building on Jacques Derrida’s Shibboleth: For Paul Celan, but following its own itinerary, this book interprets the episode in Judges together with texts by Celan, passages from William Faulkner’s Absalom! Absalom!, and Doris Salcedo’s 2007 installation Shibboleth at the Tate Modern, pursuing the track of a word to which no language can properly lay claim—a word that is both less and more than a word, that signifies both the epitome and the ruin of border control technology, and that thus, despite its violent role in the Biblical story, offers Celan a locus of poetico-political affirmation.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Encryption and Decryption"

1

Boldyreva, Alexandra, Jean Paul Degabriele, Kenneth G. Paterson, and Martijn Stam. "On Symmetric Encryption with Distinguishable Decryption Failures." In Fast Software Encryption, 367–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43933-3_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dwork, Cynthia, Moni Naor, and Omer Reingold. "Immunizing Encryption Schemes from Decryption Errors." In Advances in Cryptology - EUROCRYPT 2004, 342–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24676-3_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hohenberger, Susan, and Brent Waters. "Attribute-Based Encryption with Fast Decryption." In Public-Key Cryptography – PKC 2013, 162–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36362-7_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Saxena, Ankur, Neeraj Kaushik, and Nidhi Kaushik. "Encryption and Decryption Technique Using Java." In Advances in Intelligent Systems and Computing, 427–36. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8536-9_40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Luo, Fucai, and Kunpeng Wang. "Verifiable Decryption for Fully Homomorphic Encryption." In Developments in Language Theory, 347–65. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99136-8_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gayen, Dilip Kumar. "All-Optical Encryption and Decryption Circuit." In Lecture Notes in Electrical Engineering, 67–77. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4947-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sindhwani, Sanchit, Sabha Sheikh, Saiyed Umer, and Ranjeet Kumar Rout. "Encryption and Decryption Scheme for IoT Communications Using Multilevel Encryption." In Information and Communication Technology for Competitive Strategies (ICTCS 2020), 899–906. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0882-7_81.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bai, Xu, Lei Jiang, Xinxing Liu, and Jianlong Tan. "RSA Encryption/Decryption Implementation Based on Zedboard." In Trustworthy Computing and Services, 114–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-47401-3_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sriram, Manoharan, V. Vinay Kumar, Asaithambi Saranya, and E. Tamarai Selvam. "Multilevel Re-configurable Encryption and Decryption Algorithm." In Advances in Computing and Information Technology, 202–10. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22555-0_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sarkar, Palash. "HEAD: Hybrid Encryption with Delegated Decryption Capability." In Progress in Cryptology - INDOCRYPT 2004, 230–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30556-9_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Encryption and Decryption"

1

Kalaichelvi, V., and R. M. Chandrasekaran. "FSPAlgorithm for encryption/decryption." In 2008 International Conference on Computing, Communication and Networking (ICCCN). IEEE, 2008. http://dx.doi.org/10.1109/icccnet.2008.4787779.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hole, Rupali N., and Megha Kolhekar. "Robust video encryption and decryption using selective encryption." In 2017 International Conference on Nascent Technologies in Engineering (ICNTE). IEEE, 2017. http://dx.doi.org/10.1109/icnte.2017.7947972.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ganotra, D., S. S. Mantha, and A. Vinaya Babu. "Encryption decryption algorithm for m-commerce." In the International Conference & Workshop. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/1980022.1980071.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Manohar, N., and Peetla Vijay Kumar. "Data Encryption & Decryption Using Steganography." In 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2020. http://dx.doi.org/10.1109/iciccs48265.2020.9120935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tao, Shaohua. "A Practical Holographic Encryption/Decryption Technique." In Biomedical Optics. Washington, D.C.: OSA, 2012. http://dx.doi.org/10.1364/biomed.2012.jm3a.57.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bagwe, Gaurav R., Dhanashree S. Apsingekar, Sayali Gandhare, and Smita Pawar. "Voice encryption and decryption in telecommunication." In 2016 International Conference on Communication and Signal Processing (ICCSP). IEEE, 2016. http://dx.doi.org/10.1109/iccsp.2016.7754475.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chatsomsanga, Jutiphat, and Chawalit Benjangkaprasert. "Malware Developing Guide: Encryption and Decryption." In 2021 23rd International Conference on Advanced Communication Technology (ICACT). IEEE, 2021. http://dx.doi.org/10.23919/icact51234.2021.9370932.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Caroline Akinwonmi, Folasade, Boniface Kayode Alese, Folasade M. Dahunsi, Festus A. Osuolale, and Ayodele E Odo. "Design of Circuit System-Based Cryptography." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2155.

Full text
Abstract:
Cryptography is the science of writing in secret codes which can be achieved either by using software encrypter or hardware encrypter. This study presents the development of a pair of circuit system-based (hardware) cryptographic processor. The hardware encryption in this study was achieved using the bitwise logic operations in the registers of the microcontroller and messages are streamed as serial ASCII data from the PC through the USB port to the microcontroller unit. The encryption is performed on each ASCII representation using a pass key embedded in the microcontroller unit. Decryption process is similar but in the reverse order. A comparative analysis of the encryption time for the hardware-based data encryption was made and findings recorded. The processor was implemented using PIC18F4550 microcontroller mounted on a Printed Circuit Board alongside other components to achieve the hardware based circuitry. The software end of the encryption and decryption algorithm was developed based on a library built into C Language Visual Studio version 2010 and the CCS C compiler for communication protocol stack.
APA, Harvard, Vancouver, ISO, and other styles
9

Kumar, Lokireddi Phani, and A. K. Gupta. "Implementation of speech encryption and decryption using advanced encryption standard." In 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). IEEE, 2016. http://dx.doi.org/10.1109/rteict.2016.7808081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dhany, Hanna Willa, Fahmi Izhari, Hasanul Fahmi, Mr Tulus, and Mr Sutarman. "Encryption and Decryption using Password Based Encryption, MD5, and DES." In International Conference on Public Policy, Social Computing and Development 2017 (ICOPOSDev 2017). Paris, France: Atlantis Press, 2018. http://dx.doi.org/10.2991/icoposdev-17.2018.57.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Encryption and Decryption"

1

Negron, Melvin S. Study of the Hill Cipher Encryption/Decryption Algorithm. Fort Belvoir, VA: Defense Technical Information Center, April 2012. http://dx.doi.org/10.21236/ada581720.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dolmatov, V., ed. GOST 28147-89: Encryption, Decryption, and Message Authentication Code (MAC) Algorithms. RFC Editor, March 2010. http://dx.doi.org/10.17487/rfc5830.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography