Journal articles on the topic 'Encryption and Decryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Encryption and Decryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wadehra, Shivangi, Shivam Goel, and Nidhi Sengar. "AES Algorithm: Encryption and Decryption." International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (April 30, 2018): 1075–77. http://dx.doi.org/10.31142/ijtsrd11221.
Full textJo, Suhyung, Sang Su Lee, and Doo Ho Choi. "Data Preprocessor for Order Preserving Encryption." Applied Mechanics and Materials 752-753 (April 2015): 1356–59. http://dx.doi.org/10.4028/www.scientific.net/amm.752-753.1356.
Full textRuan, Wei Hua, and Qing Sheng Hu. "A Kind of Logarithmic Function Hardware Encryptor and Decryptor." Applied Mechanics and Materials 427-429 (September 2013): 2956–59. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2956.
Full textPronika, Pronika, and S. S. Tyagi. "Performance analysis of encryption and decryption algorithm." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 2 (August 1, 2021): 1030. http://dx.doi.org/10.11591/ijeecs.v23.i2.pp1030-1038.
Full textBozduman, Hanife Çağıl, and Erkan Afacan. "Simulation of a Homomorphic Encryption System." Applied Mathematics and Nonlinear Sciences 5, no. 1 (April 10, 2020): 479–84. http://dx.doi.org/10.2478/amns.2020.1.00046.
Full textL, Vinothkumar, and Balaji V. "Encryption and Decryption Technique Using Matrix Theory." Journal of Computational Mathematica 3, no. 2 (December 30, 2019): 1–7. http://dx.doi.org/10.26524/cm49.
Full textKaur, Kulwinder. "Performance Evaluation of Ciphers Using CRYPTOOL 2.0." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (August 1, 2012): 39–43. http://dx.doi.org/10.24297/ijct.v3i1a.2727.
Full textAminudin, Nur, Andino Maseleno, Shankar K, S. Hemalatha, K. Sathesh kumar, Fauzi ., Rita Irviani, and Muhamad Muslihudin. "Nur Algorithm on Data Encryption and Decryption." International Journal of Engineering & Technology 7, no. 2.26 (May 7, 2018): 109. http://dx.doi.org/10.14419/ijet.v7i2.26.14363.
Full textSIROMONEY, RANI, K. G. SUBRAMANIAN, and P. J. ABISHA. "ENCRYPTION-DECRYPTION TECHNIQUES FOR PICTURES." International Journal of Pattern Recognition and Artificial Intelligence 03, no. 03n04 (December 1989): 497–503. http://dx.doi.org/10.1142/s0218001489000371.
Full textBhargava, Puvvula, and Kuppam Hari Kishan. "144-BIT Encryption/Decryption Technique." International Journal of Computer Applications 1, no. 21 (February 25, 2010): 67–74. http://dx.doi.org/10.5120/53-647.
Full textDevi, SistlaVasundhara, and Harika Devi Kotha. "AES encryption and decryption standards." Journal of Physics: Conference Series 1228 (May 2019): 012006. http://dx.doi.org/10.1088/1742-6596/1228/1/012006.
Full textNayak, Nikhilesh, Akshay Chandak, Nisarg Shah, and B. Karthikeyan. "Encryption and decryption using FPGA." IOP Conference Series: Materials Science and Engineering 263 (November 2017): 052030. http://dx.doi.org/10.1088/1757-899x/263/5/052030.
Full textVisconti, Paolo, Ramiro Velazquez, Stefano Capoccia, and Roberto De Fazio. "High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G communications." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 5 (October 1, 2021): 4221. http://dx.doi.org/10.11591/ijece.v11i5.pp4221-4232.
Full textWang, Huawei, Ye Li, Yingnan Jiao, and Zhengping Jin. "An efficient outsourced attribute-based encryption scheme in the device-to-device mobile network." International Journal of Distributed Sensor Networks 15, no. 7 (July 2019): 155014771986550. http://dx.doi.org/10.1177/1550147719865507.
Full textLiu, Yonghong. "Group and Cipher in Wormhole and Quantum Entanglement." European Journal of Pure and Applied Mathematics 14, no. 2 (May 18, 2021): 521–36. http://dx.doi.org/10.29020/nybg.ejpam.v14i2.3972.
Full textG. B, Suresh, and V. Mathivanan. "Chaos Based Image Encryption." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 1 (January 1, 2018): 97. http://dx.doi.org/10.11591/ijeecs.v9.i1.pp97-100.
Full textB.J., Santhosh Kumar, and Kruthika Vijay. "Symmetric Key based Encryption and Decryption using Lissajous Curve Equations." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 1 (February 1, 2017): 285. http://dx.doi.org/10.11591/ijece.v7i1.pp285-288.
Full textAryanti, Aryanti, and Ikhthison Mekongga. "Implementation of Rivest Shamir Adleman Algorithm (RSA) and Vigenere Cipher In Web Based Information System." E3S Web of Conferences 31 (2018): 10007. http://dx.doi.org/10.1051/e3sconf/20183110007.
Full textGe, Yue Tao, Xiao Ming Liu, and Xiao Tong Yin. "Study on TEA Encryption for Public Communication Network Wireless Remoter." Applied Mechanics and Materials 565 (June 2014): 179–82. http://dx.doi.org/10.4028/www.scientific.net/amm.565.179.
Full textABDULHAMID, Mohanad, and Nyagathu GICHUKI. "Comparative Study of Cryptographic Algorithms." International Journal of Information Security and Cybercrime 8, no. 1 (June 28, 2019): 13–22. http://dx.doi.org/10.19107/ijisc.2019.01.01.
Full textCrowe, David, and Wasim Al-Hamdani. "Retained-Key Encryption." International Journal of Interdisciplinary Telecommunications and Networking 5, no. 2 (April 2013): 1–17. http://dx.doi.org/10.4018/jitn.2013040101.
Full textRasmi AL-Mousa, Mohammad, Fadi Al-salameen, and Khaled Eisa Alqawasmi. "Using Encryption Square Keywith One-Dimensional Matrix for Enhancing RGB Color Image Encryption-Decryption." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 3 (March 1, 2018): 771. http://dx.doi.org/10.11591/ijeecs.v9.i3.pp771-777.
Full textZhang, Xin He, and Guan Nan Liu. "Study on AES and its Efficient Implementation on STM32F103 Processor." Applied Mechanics and Materials 397-400 (September 2013): 1828–32. http://dx.doi.org/10.4028/www.scientific.net/amm.397-400.1828.
Full textAl-Dwairi, M. O., A. Y. Hendi, and Z. A. AlQadi. "An Efficient and Highly Secure Technique to Encrypt and Decrypt Color Images." Engineering, Technology & Applied Science Research 9, no. 3 (June 8, 2019): 4165–68. http://dx.doi.org/10.48084/etasr.2525.
Full textDarari, Radifan, Edi Winarko, and Auli Damayanti. "Encryption and Decryption Application on Images with Hybrid Algorithm Vigenere and RSA." Contemporary Mathematics and Applications (ConMathA) 2, no. 2 (December 15, 2020): 109. http://dx.doi.org/10.20473/conmatha.v2i2.23855.
Full textVilardy O., Juan M., Leiner Barba J., and Cesar O. Torres M. "Image Encryption and Decryption Systems Using the Jigsaw Transform and the Iterative Finite Field Cosine Transform." Photonics 6, no. 4 (November 26, 2019): 121. http://dx.doi.org/10.3390/photonics6040121.
Full textZargar, Ansah Jeelani. "ENCRYPTION/DECRYPTION USING ELLIPTICAL CURVE CRYPTOGRAPHY." International Journal of Advanced Research in Computer Science 8, no. 7 (August 20, 2017): 48–51. http://dx.doi.org/10.26483/ijarcs.v8i7.4208.
Full textChen, V. M., and P. J. Hogg. "Encryption and decryption of tissue factor." Journal of Thrombosis and Haemostasis 11 (June 2013): 277–84. http://dx.doi.org/10.1111/jth.12228.
Full textJyothi, P., D. Raghavaraju, and S. Vasundara. "Attribute based Encryption and Decryption Technique." International Journal of Computer Applications 132, no. 5 (December 17, 2015): 40–42. http://dx.doi.org/10.5120/ijca2015907369.
Full textChandkavathe, Vidyashri M., and Rashmi S. Bhaskar. "Optimized Full Parallelism AES Encryption / Decryption." International Journal of Electronics and Communication Engineering 3, no. 6 (June 25, 2016): 14–16. http://dx.doi.org/10.14445/23488549/ijece-v3i6p104.
Full textMankar, Manisha. "Encryption and Decryption Using Rijndael Algorithm." International Journal on Recent and Innovation Trends in Computing and Communication 3, no. 4 (2015): 2326–29. http://dx.doi.org/10.17762/ijritcc2321-8169.1504119.
Full textMohammed, Ali Abdulwahhab, and Haitham A. Anwer. "A New Method Encryption and Decryption." Webology 18, no. 1 (January 1, 2021): 20–31. http://dx.doi.org/10.14704/web/v18i1/web18002.
Full textChowdhary, Chiranji Lal, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan Perumal, and Muhammad Fazal Ijaz. "Analytical Study of Hybrid Techniques for Image Encryption and Decryption." Sensors 20, no. 18 (September 10, 2020): 5162. http://dx.doi.org/10.3390/s20185162.
Full textMa, Xiao Cong, Guang Hui Cai, Hong Chao Sun, and Hong Ye Li. "Design and Implementation of an Encryption/Decryption System Based on FPGA." Advanced Materials Research 1022 (August 2014): 368–71. http://dx.doi.org/10.4028/www.scientific.net/amr.1022.368.
Full textStoyanov, Borislav, and Gyurhan Nedzhibov. "Symmetric Key Encryption Based on Rotation-Translation Equation." Symmetry 12, no. 1 (January 2, 2020): 73. http://dx.doi.org/10.3390/sym12010073.
Full textSann, Zarni, Thi thi Soe, Kaythi Wyut Mhone Knin, and Zin May Win. "Performance Comparison of Asymmetric Cryptography (Case study- Mail message)." APTIKOM Journal on Computer Science and Information Technologies 4, no. 3 (November 1, 2019): 105–11. http://dx.doi.org/10.11591/aptikom.j.csit.147.
Full textFan, Lin Na, and Jun Liu. "A New Mechanism of Database Encryption." Applied Mechanics and Materials 135-136 (October 2011): 87–91. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.87.
Full textShahmohammadi Beni, Mehrdad, Hiroshi Watabe, and Kwan Ngok Yu. "SecureVision: An Open-Source User-Customizable Image Encryption Program." Applied Sciences 11, no. 17 (August 27, 2021): 7915. http://dx.doi.org/10.3390/app11177915.
Full textTseng, Yi-Fan, Zi-Yuan Liu, and Raylin Tso. "Practical Inner Product Encryption with Constant Private Key." Applied Sciences 10, no. 23 (December 3, 2020): 8669. http://dx.doi.org/10.3390/app10238669.
Full textGbaden, Terlumun. "A Chaos based image Encryption Scheme using one Dimensional Exponential Logistic Map." NIGERIAN ANNALS OF PURE AND APPLIED SCIENCES 1 (December 30, 2019): 223–37. http://dx.doi.org/10.46912/napas.125.
Full textAliev, F. K., A. V. Korolkov, E. A. Matveev, and I. A. Sheremet. "On the Sensitivity of the Gamma of the Quantum Cryptographic System AKM2017 to Changes in the Session Key." Programmnaya Ingeneria 12, no. 4 (July 14, 2021): 179–88. http://dx.doi.org/10.17587/prin.12.179-188.
Full textShen, Yu Fen. "The Implementation of Anti-Attack AES Mathematical Model in Library Network Encryption." Advanced Materials Research 756-759 (September 2013): 2944–47. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2944.
Full textFagin, Barry. "Composite Numbers That Give Valid RSA Key Pairs for Any Coprime p." Information 9, no. 9 (August 28, 2018): 216. http://dx.doi.org/10.3390/info9090216.
Full textKihara, Maki, and Satoshi Iriyama. "New Authentication Algorithm Based on Verifiable Encryption with Digital Identity." Cryptography 3, no. 3 (July 29, 2019): 19. http://dx.doi.org/10.3390/cryptography3030019.
Full textFlynn, Sofia. "An Investigation Into the Mathematics of Decryption Techniques in RSA Encryption, With an Implementation in Python." Spring 2021, no. 2 (July 31, 2021): 6–18. http://dx.doi.org/10.48091/gsr.v1i2.18.
Full textChen, Baoju, Simin Yu, Ping Chen, Liangshan Xiao, and Jinhu Lü. "Design and Virtex-7-Based Implementation of Video Chaotic Secure Communications." International Journal of Bifurcation and Chaos 30, no. 05 (April 2020): 2050075. http://dx.doi.org/10.1142/s0218127420500753.
Full textLiu, Bao Long, Hua Chen, and Yi Guo. "Encrypted XML Data Query Processing with Range Query." Applied Mechanics and Materials 65 (June 2011): 241–45. http://dx.doi.org/10.4028/www.scientific.net/amm.65.241.
Full textSann, Zarni, Thi Thi Soe, Kaythi Wyut Mhone Knin, and Zin May Win. "Performance comparison of asymmetric cryptography (case study-mail message)." APTIKOM Journal on Computer Science and Information Technologies 4, no. 3 (January 27, 2020): 105–11. http://dx.doi.org/10.34306/csit.v4i3.98.
Full textWang, Huai Sheng. "A No Interference Optical Image Encryption by a Fresnel Diffraction and a Fourier Transformation." Advanced Materials Research 459 (January 2012): 461–64. http://dx.doi.org/10.4028/www.scientific.net/amr.459.461.
Full textLi, You Guo. "Improved RSA Algorithm in Hardware Encryption." Applied Mechanics and Materials 543-547 (March 2014): 3610–13. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3610.
Full text