Academic literature on the topic 'Encryption and Decryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Encryption and Decryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Encryption and Decryption"
Wadehra, Shivangi, Shivam Goel, and Nidhi Sengar. "AES Algorithm: Encryption and Decryption." International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (April 30, 2018): 1075–77. http://dx.doi.org/10.31142/ijtsrd11221.
Full textJo, Suhyung, Sang Su Lee, and Doo Ho Choi. "Data Preprocessor for Order Preserving Encryption." Applied Mechanics and Materials 752-753 (April 2015): 1356–59. http://dx.doi.org/10.4028/www.scientific.net/amm.752-753.1356.
Full textRuan, Wei Hua, and Qing Sheng Hu. "A Kind of Logarithmic Function Hardware Encryptor and Decryptor." Applied Mechanics and Materials 427-429 (September 2013): 2956–59. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2956.
Full textPronika, Pronika, and S. S. Tyagi. "Performance analysis of encryption and decryption algorithm." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 2 (August 1, 2021): 1030. http://dx.doi.org/10.11591/ijeecs.v23.i2.pp1030-1038.
Full textBozduman, Hanife Çağıl, and Erkan Afacan. "Simulation of a Homomorphic Encryption System." Applied Mathematics and Nonlinear Sciences 5, no. 1 (April 10, 2020): 479–84. http://dx.doi.org/10.2478/amns.2020.1.00046.
Full textL, Vinothkumar, and Balaji V. "Encryption and Decryption Technique Using Matrix Theory." Journal of Computational Mathematica 3, no. 2 (December 30, 2019): 1–7. http://dx.doi.org/10.26524/cm49.
Full textKaur, Kulwinder. "Performance Evaluation of Ciphers Using CRYPTOOL 2.0." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (August 1, 2012): 39–43. http://dx.doi.org/10.24297/ijct.v3i1a.2727.
Full textAminudin, Nur, Andino Maseleno, Shankar K, S. Hemalatha, K. Sathesh kumar, Fauzi ., Rita Irviani, and Muhamad Muslihudin. "Nur Algorithm on Data Encryption and Decryption." International Journal of Engineering & Technology 7, no. 2.26 (May 7, 2018): 109. http://dx.doi.org/10.14419/ijet.v7i2.26.14363.
Full textSIROMONEY, RANI, K. G. SUBRAMANIAN, and P. J. ABISHA. "ENCRYPTION-DECRYPTION TECHNIQUES FOR PICTURES." International Journal of Pattern Recognition and Artificial Intelligence 03, no. 03n04 (December 1989): 497–503. http://dx.doi.org/10.1142/s0218001489000371.
Full textBhargava, Puvvula, and Kuppam Hari Kishan. "144-BIT Encryption/Decryption Technique." International Journal of Computer Applications 1, no. 21 (February 25, 2010): 67–74. http://dx.doi.org/10.5120/53-647.
Full textDissertations / Theses on the topic "Encryption and Decryption"
Manteena, Rajender. "A VHDL Implemetation of the Advanced Encryption Standard-Rijndael Algorithm." Scholar Commons, 2004. https://scholarcommons.usf.edu/etd/1149.
Full textKundur, Abhinay. "Digital and Analog Signal Encryption and Decryption in Mid RF Range Using Hybrid Acousto-Optic Chaos." University of Dayton / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1336100009.
Full textGreinsmark, Carl. "Ransomware." Thesis, Högskolan Kristianstad, Fakulteten för naturvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-20695.
Full textMerz, Doug, and Bruce Maples. "Encrypt/Decrypt COMSEC Unit for Space-based Command and Telemetry Applications." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/605565.
Full textThis paper describes the system-level architecture and design concept of a communications security (COMSEC) equipment intended for space-based low data rate (< 1 Mbps) command and telemetry applications. The COMSEC Unit is a stand-alone piece of equipment which provides decryption of uplink command and control information and encryption of downlink telemetry data. The system-level architecture is described followed by an overview of the digital design concepts and a discussion of applications. Finally, although specifically targeted for narrowband command and telemetry applications, this design approach is flexible enough to accommodate other algorithms of choice as well as operate in higher data rate applications.
Samuel, David. "RFID security in door locks." Thesis, Linköping University, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-12186.
Full textRadio frequency identification, RFID is a technology that is used in many fields including locks. The unlimited access to the reader and the transponder has resulted in severe security weaknesses and made it possible to apply different attacks. To classify door locks as secure they must at least fulfil two main criteria: the first is the use of a challenge-response authentication protocol and the second is to deploy sophisticated and secure algorithms.
MiFare classic and KeeLoq are two widely applied technologies that are still in use in many security critical applications and are considered to be secure but which have been broken by cryptanalysis and with modest efforts and cost.
How secure a certain solution is depends on how expensive it is to buy the equipment that can break the system and reveal the secret key and how secure a lock should be depends on the value of what it is protecting.
The dropping price of powerful computers and the availability of security related information on the web will lead to an increase of the number of attacks on different systems.
By the time this thesis is published those locks evaluated are not secure enough, to overcome the security shortage some improvements have to be made such as: the use of sophisticated algorithms, the use of longer key of at least 128-bit, the use of non-deterministic random number generators and the use of pure hardware solutions both in the receiver and the transmitter to reduce leakage.
Chaparala, Suman Krishna. "Secure Encryption and Decryption by Aperture Variations of a Photodetector in an Acousto-Optic Bragg Cell." University of Dayton / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1468527741.
Full textKandi, Jayavardhan R. "Embedded Cryptography: An Analysis and Evaluation of Performance and Code Optimization Techniques for Encryption and Decryption in Embedded Systems." [Tampa, Fla.] : University of South Florida, 2003. http://purl.fcla.edu/fcla/etd/SFE0000151.
Full textJayapal, Ranjith. "Biometric encryption system for increased security." UNF Digital Commons, 2017. http://digitalcommons.unf.edu/etd/746.
Full textAl-saedi, Mohammed Abdullah. "Examination of Acousto-Optic Chaos and Application to RF Signal Encryption and Recovery." University of Dayton / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1337808954.
Full textLuque, González Jorge, and Fernandez Ignacio Arenchaga. "Data Encryption on a Network." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-9352.
Full textEn este proyecto encontraras un estudio sobre diferentes algoritmos de encriptación, que son usados para salvaguardar la información en mensajes por la red. Además hemos desarrollado una aplicación cliente-servidor que enviara información a través de la red de forma segura. Hay dos tipos de algoritmos de encriptación, los simétricos y los asimétricos. Ambos tipos de algoritmos son utilizados para establecer la comunicación, el asimétrico (RSA) es utilizado para establecer la clave del simétrico y a partir de entonces se utilizara exclusivamente el algoritmo simétrico (Blowfish).
Books on the topic "Encryption and Decryption"
Muniraj, Inbarasan, and John T. Sheridan. Optical Encryption and Decryption. SPIE, 2019. http://dx.doi.org/10.1117/3.2523506.
Full textMartin, Keith M. Public-Key Encryption. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0005.
Full textRedbooks, IBM. Mqseries Security: Example of Using a Channel Security Exit, Encryption and Decryption. Ibm, 1998.
Find full textDecrypting the Encryption Debate. Washington, D.C.: National Academies Press, 2018. http://dx.doi.org/10.17226/25010.
Full textNational Academies of Sciences, Engineering, and Medicine. Decrypting the Encryption Debate: A Framework for Decision Makers. National Academies Press, 2018.
Find full textRedfield, Marc. Shibboleth. Fordham University Press, 2020. http://dx.doi.org/10.5422/fordham/9780823289066.001.0001.
Full textBook chapters on the topic "Encryption and Decryption"
Boldyreva, Alexandra, Jean Paul Degabriele, Kenneth G. Paterson, and Martijn Stam. "On Symmetric Encryption with Distinguishable Decryption Failures." In Fast Software Encryption, 367–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43933-3_19.
Full textDwork, Cynthia, Moni Naor, and Omer Reingold. "Immunizing Encryption Schemes from Decryption Errors." In Advances in Cryptology - EUROCRYPT 2004, 342–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24676-3_21.
Full textHohenberger, Susan, and Brent Waters. "Attribute-Based Encryption with Fast Decryption." In Public-Key Cryptography – PKC 2013, 162–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36362-7_11.
Full textSaxena, Ankur, Neeraj Kaushik, and Nidhi Kaushik. "Encryption and Decryption Technique Using Java." In Advances in Intelligent Systems and Computing, 427–36. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8536-9_40.
Full textLuo, Fucai, and Kunpeng Wang. "Verifiable Decryption for Fully Homomorphic Encryption." In Developments in Language Theory, 347–65. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99136-8_19.
Full textGayen, Dilip Kumar. "All-Optical Encryption and Decryption Circuit." In Lecture Notes in Electrical Engineering, 67–77. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4947-9_5.
Full textSindhwani, Sanchit, Sabha Sheikh, Saiyed Umer, and Ranjeet Kumar Rout. "Encryption and Decryption Scheme for IoT Communications Using Multilevel Encryption." In Information and Communication Technology for Competitive Strategies (ICTCS 2020), 899–906. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0882-7_81.
Full textBai, Xu, Lei Jiang, Xinxing Liu, and Jianlong Tan. "RSA Encryption/Decryption Implementation Based on Zedboard." In Trustworthy Computing and Services, 114–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-47401-3_15.
Full textSriram, Manoharan, V. Vinay Kumar, Asaithambi Saranya, and E. Tamarai Selvam. "Multilevel Re-configurable Encryption and Decryption Algorithm." In Advances in Computing and Information Technology, 202–10. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22555-0_22.
Full textSarkar, Palash. "HEAD: Hybrid Encryption with Delegated Decryption Capability." In Progress in Cryptology - INDOCRYPT 2004, 230–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30556-9_19.
Full textConference papers on the topic "Encryption and Decryption"
Kalaichelvi, V., and R. M. Chandrasekaran. "FSPAlgorithm for encryption/decryption." In 2008 International Conference on Computing, Communication and Networking (ICCCN). IEEE, 2008. http://dx.doi.org/10.1109/icccnet.2008.4787779.
Full textHole, Rupali N., and Megha Kolhekar. "Robust video encryption and decryption using selective encryption." In 2017 International Conference on Nascent Technologies in Engineering (ICNTE). IEEE, 2017. http://dx.doi.org/10.1109/icnte.2017.7947972.
Full textGanotra, D., S. S. Mantha, and A. Vinaya Babu. "Encryption decryption algorithm for m-commerce." In the International Conference & Workshop. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/1980022.1980071.
Full textManohar, N., and Peetla Vijay Kumar. "Data Encryption & Decryption Using Steganography." In 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2020. http://dx.doi.org/10.1109/iciccs48265.2020.9120935.
Full textTao, Shaohua. "A Practical Holographic Encryption/Decryption Technique." In Biomedical Optics. Washington, D.C.: OSA, 2012. http://dx.doi.org/10.1364/biomed.2012.jm3a.57.
Full textBagwe, Gaurav R., Dhanashree S. Apsingekar, Sayali Gandhare, and Smita Pawar. "Voice encryption and decryption in telecommunication." In 2016 International Conference on Communication and Signal Processing (ICCSP). IEEE, 2016. http://dx.doi.org/10.1109/iccsp.2016.7754475.
Full textChatsomsanga, Jutiphat, and Chawalit Benjangkaprasert. "Malware Developing Guide: Encryption and Decryption." In 2021 23rd International Conference on Advanced Communication Technology (ICACT). IEEE, 2021. http://dx.doi.org/10.23919/icact51234.2021.9370932.
Full textCaroline Akinwonmi, Folasade, Boniface Kayode Alese, Folasade M. Dahunsi, Festus A. Osuolale, and Ayodele E Odo. "Design of Circuit System-Based Cryptography." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2155.
Full textKumar, Lokireddi Phani, and A. K. Gupta. "Implementation of speech encryption and decryption using advanced encryption standard." In 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). IEEE, 2016. http://dx.doi.org/10.1109/rteict.2016.7808081.
Full textDhany, Hanna Willa, Fahmi Izhari, Hasanul Fahmi, Mr Tulus, and Mr Sutarman. "Encryption and Decryption using Password Based Encryption, MD5, and DES." In International Conference on Public Policy, Social Computing and Development 2017 (ICOPOSDev 2017). Paris, France: Atlantis Press, 2018. http://dx.doi.org/10.2991/icoposdev-17.2018.57.
Full textReports on the topic "Encryption and Decryption"
Negron, Melvin S. Study of the Hill Cipher Encryption/Decryption Algorithm. Fort Belvoir, VA: Defense Technical Information Center, April 2012. http://dx.doi.org/10.21236/ada581720.
Full textDolmatov, V., ed. GOST 28147-89: Encryption, Decryption, and Message Authentication Code (MAC) Algorithms. RFC Editor, March 2010. http://dx.doi.org/10.17487/rfc5830.
Full text