Journal articles on the topic 'Encryption module'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Encryption module.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Liu, Guanxiu. "The Application of Data Encryption Technology in Computer Network Communication Security." Mobile Information Systems 2022 (August 29, 2022): 1–10. http://dx.doi.org/10.1155/2022/3632298.
Full textKaur, Kulwinder. "Performance Evaluation of Ciphers Using CRYPTOOL 2.0." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (2012): 39–43. http://dx.doi.org/10.24297/ijct.v3i1a.2727.
Full textLi, Hongming, Lilai Zhang, Hao Cao, and Yirui Wu. "Hash Based DNA Computing Algorithm for Image Encryption." Applied Sciences 13, no. 14 (2023): 8509. http://dx.doi.org/10.3390/app13148509.
Full textAitkhozhayeva, Y. Zh, and D. S. Akhmetsharipov. "Technology for using special encryption functions in PostgreSQL." Bulletin of the National Engineering Academy of the Republic of Kazakhstan 91, no. 1 (2024): 21–29. http://dx.doi.org/10.47533/2024.1606-146x.02.
Full textSun, Wen Jie. "Research on General Permutation Encryption Module Based on Chaos Theory." Applied Mechanics and Materials 686 (October 2014): 381–87. http://dx.doi.org/10.4028/www.scientific.net/amm.686.381.
Full textSon, Byounghee, Euiseok Nahm, and Hagbae Kim. "VoIP encryption module for securing privacy." Multimedia Tools and Applications 63, no. 1 (2012): 181–93. http://dx.doi.org/10.1007/s11042-011-0956-1.
Full textZhao, Dongfang. "Compile-Time Fully Homomorphic Encryption: Eliminating Online Encryption via Algebraic Basis Synthesis." Cryptography 9, no. 2 (2025): 44. https://doi.org/10.3390/cryptography9020044.
Full textKe, Chih Kun, and Zheng Hua Lin. "Secure Data Synchronization over a Mobile Peer-to-Peer Network." Applied Mechanics and Materials 764-765 (May 2015): 950–54. http://dx.doi.org/10.4028/www.scientific.net/amm.764-765.950.
Full textMukherjee, Anisha, Aikata Aikata, Ahmet Can Mert, et al. "ModHE: Modular Homomorphic Encryption Using Module Lattices." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 1 (2023): 527–62. http://dx.doi.org/10.46586/tches.v2024.i1.527-562.
Full textLi, Hong Ye, Guang Hui Cai, Hong Chao Sun, and Xiao Cong Ma. "Design and Implementation of AES Key Generator Based on FPGA." Advanced Materials Research 1022 (August 2014): 104–7. http://dx.doi.org/10.4028/www.scientific.net/amr.1022.104.
Full textVishaka, Ambardar, and Munish Rattan Dr. "Implementation of Secured MIPS Pipeline Processor using RC6 Algorithm with Vhdl." International Journal of Advanced Research in Computer Science and Software Engineering 5, no. 2 (2015): 227–31. https://doi.org/10.5281/zenodo.32429.
Full textSeniv, Maksym M., Sviatoslav I. Rovenchak, and Vitaliy S. Yakovyna. "Software implementation of the data encryption module on the BeagleBone platform for data transmission systems with increased cryptoresistance." Herald of Advanced Information Technology 6, no. 4 (2023): 338–51. http://dx.doi.org/10.15276/hait.06.2023.22.
Full textD, Narmatha, Jenifa W, Merlin Moses M, and Prem Kumar J. "Text File Encryption and Decryption by FFT and IFFT Algorithm Using Lab view." Journal of Communication Engineering and Its Innovations 5, no. 3 (2019): 8–15. https://doi.org/10.5281/zenodo.3525834.
Full textLIN, XIN, WEIHUI SHI, and YONGXIANG DU. "INTERACTIVE DATA ENCRYPTION STRATEGY FOR DISTRIBUTED SIMULATION SYSTEM." International Journal of Modeling, Simulation, and Scientific Computing 04, no. 04 (2013): 1342005. http://dx.doi.org/10.1142/s1793962313420051.
Full textHan, Ke, Youyan Duan, Rui Jin, Wendou Wu, Baijuan Wang, and Xiaobo Cai. "Optimal Design of Encryption Module in IoT." Procedia Computer Science 187 (2021): 481–87. http://dx.doi.org/10.1016/j.procs.2021.04.087.
Full textChen, Xiao, and De Xin Yao. "Multiway Responder with Wireless Communication Technology." Applied Mechanics and Materials 39 (November 2010): 465–69. http://dx.doi.org/10.4028/www.scientific.net/amm.39.465.
Full textKalimoldayev, M., S. Tynymbayev, M. Ibraimov, M. Magzom, Y. Kozhagulov, and T. Namazbayev. "PIPELINE MULTIPLIER OF POLYNOMIALS MODULO WITH ANALYSIS OF HIGH-ORDER BITS OF THE MULTIPLIER." BULLETIN 386, no. 4 (2020): 13–20. http://dx.doi.org/10.32014/2020.2518-1467.98.
Full textZhao, Ruihang, and Wei Zhang. "Design and Implementation of AGV Scheduling System based on Spring." Journal of Physics: Conference Series 2320, no. 1 (2022): 012010. http://dx.doi.org/10.1088/1742-6596/2320/1/012010.
Full textSahana, B. M., Rohith S, Sandhiya C, and Padalingam Padalingam. "Securing Cloud Storage Using Homomorphic Encryption." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43782.
Full textИСМАГИЛОВА, А. С., and Н. Д. ЛУШНИКОВ. "SOFTWARE MODULE ENCRYPTING USER BIOMETRIC DATA." Автометрия 59, no. 4 (2023): 20–28. http://dx.doi.org/10.15372/aut20230403.
Full textV. Kinge, Pravin, S. J. Honale, and C. M. Bobade. "Design of AES Pipelined Architecture for Image Encryption/Decryption Module." International Journal of Reconfigurable and Embedded Systems (IJRES) 3, no. 3 (2014): 114. http://dx.doi.org/10.11591/ijres.v3.i3.pp114-118.
Full textXu, Changhui, Jingkui Zhang, Zhiyou Zhang, Jianning Hou, and Xujie Wen. "Data and Service Security of GNSS Sensors Integrated with Cryptographic Module." Micromachines 14, no. 2 (2023): 454. http://dx.doi.org/10.3390/mi14020454.
Full textAaruni, P. M., Baby Aleena, Antony Angel, Benny Binsha, and Gopinath Anjaly. "Substitution Box Optimization." Journal of Electronics and Communication Systems 4, no. 3 (2019): 21–24. https://doi.org/10.5281/zenodo.3531510.
Full textTsmots, Ivan, Vasyl Rabyk, and Yurii Lukashchuk. "Development of Mobile Facilities of Neuro-like Cryptographic Encryption and Decryption of Data in Real Time." Vìsnik Nacìonalʹnogo unìversitetu "Lʹvìvsʹka polìtehnìka". Serìâ Ìnformacìjnì sistemi ta merežì 9 (June 10, 2021): 84–95. http://dx.doi.org/10.23939/sisn2021.09.084.
Full textLiu, Xiaowei, and Hongjin Liu. "Design of English Mobile Learning Platform Based on GSM-R Wireless Network Communication System." International Journal of Antennas and Propagation 2021 (September 30, 2021): 1–9. http://dx.doi.org/10.1155/2021/9944169.
Full textLi, Weijing, Zicheng Zhou, Wen Fan, and Juan Gao. "Design of Data Sharing Platform Based on Blockchain and IPFS Technology." Wireless Communications and Mobile Computing 2022 (July 13, 2022): 1–7. http://dx.doi.org/10.1155/2022/3937725.
Full textKachko, O. G., Yu I. Gorbenko, M. V. Esina, and O. S. Akolzina. "Optimization of NTRU Prime asymmetric encryption algorithm." Radiotekhnika, no. 191 (December 22, 2017): 5–10. http://dx.doi.org/10.30837/rt.2017.4.191.01.
Full textLalu Prasad Jamana, Swapna Annapareddy, Lakshmi Narayana Kolipakula, Ganesh Dasu, and Sadhik Shaik. "Blockchain-based two-level QR Code: A new era of secure data sharing." International Journal of Science and Research Archive 15, no. 1 (2025): 147–54. https://doi.org/10.30574/ijsra.2025.15.1.0933.
Full textKarimov, Madjit Malikovich ,., Nizomiddin Najmiddin Ugli Ochilov, and Abdiqahhar Egamovich Tangirov. "Encryption Methods and Algorithms Based on Domestic Standards in Open-Source Operating Systems." WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS 20 (February 20, 2023): 42–49. http://dx.doi.org/10.37394/23209.2023.20.6.
Full textAstha, tiwari, and Muhammad Arif Prof. "Design and Verification of ASIP- Dual Modified Key Generator Based Encryption for Cloud Storage." International Journal of Advanced and Innovative Research 7, no. 2 (2018): 40–45. https://doi.org/10.5281/zenodo.1184880.
Full textObour Agyekum, Kwame, Qi Xia, Emmanuel Sifah, et al. "A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain." Sensors 19, no. 5 (2019): 1235. http://dx.doi.org/10.3390/s19051235.
Full textLi, X. Y. "A Service Oriented Jewelry Image Watermarking Encryption Method." Advanced Materials Research 1049-1050 (October 2014): 1339–42. http://dx.doi.org/10.4028/www.scientific.net/amr.1049-1050.1339.
Full textM S, Shrikanth, and Ashwini C. "Smart Tender Management System Using Blockchain in Python." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 07 (2024): 1–13. http://dx.doi.org/10.55041/ijsrem36750.
Full textSMIRNOVA, TETIANA, NATALIIA YAKYMENKO, OLEKSII SMIRNOV, LIUDMYLA POLISHCHUK, and SERHII SMIRNOV. "STUDY OF STATISTICAL STABILITY AND FAST CHARACTERISTICS OF THE PROPOSED HASHING FUNCTION OF THE IMPROVED CRYPTOGRAPHIC MODULE IN INFORMATION AND COMMUNICATION SYSTEMS." Herald of Khmelnytskyi National University. Technical sciences 307, no. 2 (2022): 46–52. http://dx.doi.org/10.31891/2307-5732-2022-307-2-46-52.
Full textSmirnova, Tetiana, Nataliia Yakymenko, Oleksandr Ulichev, Oksana Konoplitska-Slobodeniuk Konoplitska-Slobodeniuk, and Serhii Smirnov. "INVESTIGATION OF LINEAR TRANSFORMATIONS OF THE PROPOSED HUSHING FUNCTION OF THE ADVANCED MODULE OF CRYPTOGRAPHIC PROTECTION IN INFORMATION AND CIRCUMSTANCES." Cybersecurity: Education, Science, Technique 3, no. 15 (2022): 85–92. http://dx.doi.org/10.28925/2663-4023.2022.15.8592.
Full textDang, Chi Van, Khoat Duc Nguyen, Luc The Nguyen, Dung Ngoc Le, Quan Hong Luu, and Son Thanh Huynh. "Applying AES algorithm for secure data transmission between Sensor node and LoRa Gateway to Web Server." Journal of Mining and Earth Sciences 63, no. 1 (2022): 105–14. http://dx.doi.org/10.46326/jmes.2022.63(1).10.
Full textSaha, Mainak, M. Trinath Basu, Arpita Gupta, et al. "Enhancing credit card security using RSA encryption and tokenization: a multi-module approach." International Journal of Informatics and Communication Technology (IJ-ICT) 14, no. 1 (2025): 132. https://doi.org/10.11591/ijict.v14i1.pp132-140.
Full textMainak, Saha, Trinath Basu M., Gupta Arpita, et al. "Enhancing credit card security using RSA encryption and tokenization: a multi-module approach." International Journal of Informatics and Communication Technology 14, no. 1 (2025): 132–40. https://doi.org/10.11591/ijict.v14i1.pp132-140.
Full textRhee, Eugene, and Jihoon Lee. "Enhanced ARIA-based counter mode deterministic random bit generator random number generator implemented in verilog." Indonesian Journal of Electrical Engineering and Computer Science 33, no. 3 (2024): 1416. http://dx.doi.org/10.11591/ijeecs.v33.i3.pp1416-1423.
Full textRhee, Eugene, and Jihoon Lee. "Enhanced ARIA-based counter mode deterministic random bit generator random number generator implemented in verilog." Indonesian Journal of Electrical Engineering and Computer Science 33, no. 3 (2024): 1416–23. https://doi.org/10.11591/ijeecs.v33.i3.pp1416-1423.
Full textElkhodr, Mahmoud, Samiya Khan, and Ergun Gide. "A Novel Semantic IoT Middleware for Secure Data Management: Blockchain and AI-Driven Context Awareness." Future Internet 16, no. 1 (2024): 22. http://dx.doi.org/10.3390/fi16010022.
Full textMr G shekar, Asthami Sai Kiran, Muthe Harish, and Padala Sai Rahul. "Multi tenancy cloud data with a shared privacy preserving trusted keyword search." International Journal of Information Technology and Computer Engineering 13, no. 2 (2025): 1290–95. https://doi.org/10.62647/ijitce2025v13i2pp1290-1295.
Full textLi, Yuehua, Chengcheng Wang, Jiahao Sun, Zhijin Guan, Jiaqing Chen, and Zelin Wang. "Research and Application of Encryption System Based on Quantum Circuit for Mobile Internet Security." International Journal of Cognitive Informatics and Natural Intelligence 15, no. 4 (2021): 1–17. http://dx.doi.org/10.4018/ijcini.20211001.oa26.
Full textPapadopoulos, Iason, and Jiabo Wang. "Polar Codes for Module-LWE Public Key Encryption: The Case of Kyber." Cryptography 7, no. 1 (2023): 2. http://dx.doi.org/10.3390/cryptography7010002.
Full textFahlevi, Reza, and Muhammad Salman. "Design of Data Security Module Using Key-Policy Attribute Based Encryption (KP-ABE) Algorithm for an Internet-of-Things System." Jurnal Penelitian Pendidikan IPA 10, no. 11 (2024): 9825–31. https://doi.org/10.29303/jppipa.v10i11.8289.
Full textPathak, Aditya, Anmol Kaur, and Sagar. "Data Encryption Using Morse Code." CGC International Journal of Contemporary Technology and Research 4, no. 2 (2022): 319–22. http://dx.doi.org/10.46860/cgcijctr.2022.07.31.319.
Full textSalnikov, Dmytro, Dmytro Karaman, and Viktoriia Krylova. "HIGHLY RECONFIGURABLE SOFT-CPU BASED PERIPHERAL MODULES DESIGN." Advanced Information Systems 7, no. 2 (2023): 92–97. http://dx.doi.org/10.20998/2522-9052.2023.2.13.
Full textChaukade, Anmol Kumar, and P. Murali. "A Study of Colour Image Encryption with Chaos Logistic Map and DNA Encoding Techniques." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (2022): 1121–27. http://dx.doi.org/10.22214/ijraset.2022.40834.
Full textYu, Wen-Kai, Shuo-Fei Wang, and Ke-Qian Shang. "Optical Encryption Using Attention-Inserted Physics-Driven Single-Pixel Imaging." Sensors 24, no. 3 (2024): 1012. http://dx.doi.org/10.3390/s24031012.
Full textLiu, Jinhua, Caiping Wang, and Xianchun Xiao. "Design and Application of Science and Technology Project Management Information System for Educational Institutes." Mobile Information Systems 2021 (September 25, 2021): 1–10. http://dx.doi.org/10.1155/2021/2074495.
Full text