Academic literature on the topic 'Encryption process'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Encryption process.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Encryption process"

1

Alawi, Attaa R., and Nidaa F. Hassan. "A Proposal Video Encryption Using Light Stream Algorithm." Engineering and Technology Journal 39, no. 1B (2021): 184–96. http://dx.doi.org/10.30684/etj.v39i1b.1689.

Full text
Abstract:
Video encrypting is one technique to protect digital videos, it used to avoid unwanted interference and viewing of the transmitted videos. In this paper, a new selective video cryptography algorithm is suggested using light stream algorithm. As it known video size is large in size and it consume time in the encryption process, ChaCha a light encryption algorithm has been used to reduce the encryption time, encryption is done by Xoring frames of video with the key generated from ChaCha algorithm, it produced an acceptable results from robustness point view, but still encryption process consumed
APA, Harvard, Vancouver, ISO, and other styles
2

Huda Anwar and Zill e Shams. "Algorithms of Encryption Using Graph Theory." Mathematical Sciences and Applications 2, no. 2 (2023): 73–85. http://dx.doi.org/10.52700/msa.v2i2.16.

Full text
Abstract:
Encryption plays a vital role in securing sensitive information in various domains from communication networks to financial transactions. Graph theory, with its vast mathematical framework and powerful algorithms, presents a potential method for creating encryption methods. This abstract introduces an algorithm that leveragesgraph theory concepts to provide a symmetric encryption method. Encryption is the process of hiding the original plain-text message by producing a cipher text; decryption is the process of resolving the cipher text to reveal the original plain-text message. In this researc
APA, Harvard, Vancouver, ISO, and other styles
3

Agarwal, Sohit, and Gagan Joshi. "Hybrid Encryption of Cloud Processing With IOT Devices Using DNA And RSA Cryptography." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 6 (2023): 21–27. http://dx.doi.org/10.17762/ijritcc.v11i6.6767.

Full text
Abstract:
The research paper titled "Hybrid Data Encryption as well as Decryption Using Hybrid RSA and DNA" develops a hybrid cryptosystem by combining the usefulness of such an asymmetric-key (public-key) cryptosystem with the efficacy of a symmetric-key (private-key) cryptosystem. These two types of cryptosystems use different types of keys. The method addresses concerns regarding the users' right to privacy, authentication, and accuracy by utilizing a data encryption process that is secure in both directions. Both the process of encrypting data and the process of decrypting data, which are both utili
APA, Harvard, Vancouver, ISO, and other styles
4

Abeer Salim Jamil, Raghad Abdulaali Azeez, and Nidaa Flaih Hassan. "An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments." International Journal of Online and Biomedical Engineering (iJOE) 19, no. 01 (2023): 93–106. http://dx.doi.org/10.3991/ijoe.v19i01.36901.

Full text
Abstract:
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Guang Shi. "Research on Encryption Method of the GML Spatial Data in Geographic Information Sharing System." Advanced Materials Research 756-759 (September 2013): 1506–10. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1506.

Full text
Abstract:
This paper analyzed the typical architecture of geographic information sharing system based on GML spatial data, pointed out the security risks existed in the network transmission process of the GML spatial data and drawbacks of the existing security transport mechanisms in such a shared system. Further, the paper elaborates on advantages of encrypting the GML data using XML Encryption technology and the encryption process of the GML spatial data. On this basis, the paper gives an application example which encrypts all or part of spatial data in GML documents by the XML Encryption technology.
APA, Harvard, Vancouver, ISO, and other styles
6

Limbachia, Dipen. "Encryption of Card Details Using AES with a 128-bit Key a Secure Approach to Data Protection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 03 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem29484.

Full text
Abstract:
Data security is a critical concern in today's digital age, particularly regarding the protection of sensitive information such as cardholder data. This research paper explores the implementation of Advanced Encryption Standard (AES) encryption with a 128-bit key as a means of safeguarding card details. The project demonstrates the encryption and decryption process, ensuring data confidentiality and integrity. Utilizing the pycryptodome library in Python, the AES encryption technique is applied to encrypt card details, offering a secure approach to data protection. The methodology section outl
APA, Harvard, Vancouver, ISO, and other styles
7

Abdul Hussien, Farah Tawfiq, Abdul Monem S. Rahma, and Hala Bahjat Abdul Wahab. "A Secure Environment Using a New Lightweight AES Encryption Algorithm for E-Commerce Websites." Security and Communication Networks 2021 (December 24, 2021): 1–15. http://dx.doi.org/10.1155/2021/9961172.

Full text
Abstract:
Providing security for transmitted data through the e-commerce environment requires using a fast and high secure encryption algorithm. Balancing between the speed and the security degree is a problem that many of the encryption algorithms suffer from. Increasing the security degree requires increasing the level of complexity which results in increasing encryption time. On the other hand, increasing the algorithm speed may reduce the complexity degree which affects the security level. This paper aims to design an encryption algorithm that balances time and complexity (speed and security). This
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Yibo. "Discussion and Optimization of AES and SM4 Encryption Algorithms." Frontiers in Computing and Intelligent Systems 12, no. 1 (2025): 119–24. https://doi.org/10.54097/cm6eq023.

Full text
Abstract:
This paper creates a new direction for the operation optimization of Simplified Message Block Cipher for 128-bit Data encryption (SM4) national cipher algorithm, which combines with AES algorithm to provide a simpler encryption method for SM4 algorithm. The AES algorithm is for the whole file system-based f encryption scheme, and the implementation concept is to encrypt the file and maintain data security by encrypting files to encrypt and maintain data security. The advantages of this encryption method are that they have few key numbers and are easy to manage. The disadvantage is that when a
APA, Harvard, Vancouver, ISO, and other styles
9

Nori, Ahmed S., and Ansam O. Abdulmajeed. "Design and implementation of Threefish cipher algorithm in PNG file." Sustainable Engineering and Innovation 3, no. 2 (2021): 79–91. http://dx.doi.org/10.37868/sei.v3i2.id131.

Full text
Abstract:
This paper is presenting design and implementation of Threefish block cipher on grayscale images. Despite the fact that Threefish block cipher is one of the best secure algorithms, most studies concerning Threefish have focused on hardware implementation and have not commonly been applied on image encryption due to huge amount of data. The main contribution here was to reduce the time and the amount of data to be encrypted while maintaining encryption performance. This objective was achieved by encrypting just the most significant bits of image pixels. A 256-bit plain text blocks of the Threef
APA, Harvard, Vancouver, ISO, and other styles
10

Milian, Yanuar Chris, and Wiwin Sulistyo. "Model Pengembangan Keamanan Data dengan Algoritma ROT 13 Extended Vernam Cipher dan Stream Cipher." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 7, no. 2 (2023): 208–16. http://dx.doi.org/10.35870/jtik.v7i2.716.

Full text
Abstract:
This research focuses on the importance of data security in maintaining confidentiality, particularly for sensitive and critical information that should only be accessed by certain parties. Cryptography is a mathematical method used to secure data. Several methods are available, including ROT13, Vernam Cipher, and Stream Cipher. This study combines these three methods to achieve a higher level of data security. The analysis shows that the combination of these algorithms results in a stronger and more complex encryption process than using a single method. The process involves encrypting plainte
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Encryption process"

1

Siddiqi, Saad Ahmed. "Smart Card Packaging Process Control System." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-100020.

Full text
Abstract:
The project focuses on the packaging process of the smart card manufacturing industry. The idea of the project concerns how to increase production packaging efficiency by introducing a control system. After taking an in-depth look at the current production environment, the following system goals were defined: packaging time reduction, cost reduction, decrease in human errors, and reducing the number of customer complaints. To achieve these goals, the thesis project was divided into the following tasks: discovering a feasible solution, actual system development, testing, and evaluation. The pro
APA, Harvard, Vancouver, ISO, and other styles
2

Henry, Tiphaine. "Towards trustworthy, flexible, and privacy-preserving peer-to-peer business process management systems." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS024.

Full text
Abstract:
La technologie blockchain peut être utilisée comme outil de désintermédiation fiable pour la gestion des processus métiers inter-organisationnels. Elle assure la traçabilité de l'exécution des activités et du flux de contrôle. Cependant, assurer la confiance dans le protocole de déploiement et d'exécution, permettre la flexibilité des processus et respecter la confidentialité des données restent trois verrous à solutionner dans cet environnement.Pour résoudre les problématiques susmentionnées , nous présentons les contributions suivantes.D'abord, nous présentons un mécanisme de déploiement et
APA, Harvard, Vancouver, ISO, and other styles
3

Du, Rong. "Secure electronic tendering." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16606/1/Rong_Du_Thesis.pdf.

Full text
Abstract:
Tendering is a method for entering into a sales contract. Numerous electronic tendering systems have been established with the intent of improving the efficiency of the tendering process. Although providing adequate security services is a desired feature in an e-tendering system, current e-tendering systems are usually designed with little consideration of security and legal compliance. This research focuses on designing secure protocols for e-tendering systems. It involves developing methodologies for establishing security requirements, constructing security protocols and using formal
APA, Harvard, Vancouver, ISO, and other styles
4

Du, Rong. "Secure electronic tendering." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16606/.

Full text
Abstract:
Tendering is a method for entering into a sales contract. Numerous electronic tendering systems have been established with the intent of improving the efficiency of the tendering process. Although providing adequate security services is a desired feature in an e-tendering system, current e-tendering systems are usually designed with little consideration of security and legal compliance. This research focuses on designing secure protocols for e-tendering systems. It involves developing methodologies for establishing security requirements, constructing security protocols and using formal
APA, Harvard, Vancouver, ISO, and other styles
5

Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.

Full text
Abstract:
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciar
APA, Harvard, Vancouver, ISO, and other styles
6

Agrawa], Sourav Kumar. "High security image encryption by 3stage process." Thesis, 2014. http://ethesis.nitrkl.ac.in/6467/1/E-46.pdf.

Full text
Abstract:
As a result of the development of computer network technology, communication of in- formation through personal computer is becoming more convenient. Meanwhile, it also gives hackers opportunities to attack the network. Therefore the security is now an important issue for multimedia communications. Image compression and image encryption are pivotal to proper storage and transmission of images. Simultaneous image compression and encryption aims at achieving enhanced bandwidth utilization and security at the same time. The concepts used here are : Chinese Reminder Theorem, Chaotic map, Bit plane
APA, Harvard, Vancouver, ISO, and other styles
7

CHIU, CHUN-YIN, and 邱俊尹. "A Study on User Account Login Process Bases on Symmetric Block Encryption Scheme with Pseudo Random Number Measures." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/nsxc59.

Full text
Abstract:
碩士<br>國防大學<br>資訊管理學系<br>105<br>It keeps a rapid development in information technology and the Internet; but there exists many information security cases that hackers invade different type of web servers over the Internet with many crack skills. For defensing this security issue, one possible solution is to strengthen a login mechanism for a web server. For strengthening a login mechanism of a web server, this study proposes a security enhancement login scheme for a web server. In this proposed login scheme, this study adopts a symmetric block encryption scheme with a LCG pseudo random generato
APA, Harvard, Vancouver, ISO, and other styles
8

Chego, Lloyd. "Whether using encryption in SCADA systems, the services performance requirements are still met in OT IT environment over an MPLS core network?" Thesis, 2016. http://hdl.handle.net/10539/21050.

Full text
Abstract:
A Research Project Abstract submitted in fulfillment of the requirements for Master of Science in Engineering [Electrical]: Telecommunications at the University Of The Witwatersrand, Johannesburg 07 June 2016<br>Utilities use Supervisory Control and Data Acquisition systems as their industrial control system. The architecture of these systems in the past was based on them being isolated from other networks. Now with recent ever changing requirements of capabilities from these systems there is a need to converge with information technology systems and with the need to have these indus
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Encryption process"

1

Sanín-Restrepo, Ricardo, Marinella Machado-Araujo, and Sabelo J. Ndlovu-Gatsheni, eds. Decrypting Justice. Lexington Books, 2025. https://doi.org/10.5040/9781978748538.

Full text
Abstract:
This book deploys the theory of encryption of to decrypt justice, setting in opposition Justice, written with the hegemonic capital letters of Western ideas, and justice, in its everyday workings within disparate communal forms and the exercise of multiplicity. As it decrypts justice, the book argues that late-coloniality, through its construction of the “hidden people,” shattered the possibility of true communities in the service of a transcendent model, consisting ofthe market, the constitution, the nation, and the economy. The first three chapters serve as the theoretical backbone of the bo
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Encryption process"

1

Daemen, Joan, and Vincent Rijmen. "The Advanced Encryption Standard Process." In Information Security and Cryptography. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/978-3-662-04722-4_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Daemen, Joan, and Vincent Rijmen. "The Advanced Encryption Standard Process." In Information Security and Cryptography. Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-60769-5_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Firdous, Saltanat, Asutosh Brahma, Arjun Menon, and Chester Rebeiro. "CoPrIME: Complete Process Isolation Using Memory Encryption." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2024. https://doi.org/10.1007/978-3-031-80408-3_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Weissbaum, François, and Thomas Lugrin. "Symmetric Cryptography." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_2.

Full text
Abstract:
AbstractSymmetric encryption is the most common method to guarantee the confidentiality of a message or information. Encryption is a cryptographic process that makes it impossible for anyone who needs the decryption key to gain knowledge of plaintext. It is called symmetric when it uses the same key for encryption and decryption. The required key length for symmetric encryption must be at least 256 bits to guarantee sufficient protection against brute force attacks and the possible arrival of quantum computers. To conclude, well-established cryptographic libraries implementing standard algorithms should be preferred over homemade implementation.
APA, Harvard, Vancouver, ISO, and other styles
5

Rafiei, Majid, Leopold von Waldthausen, and Wil M. P. van der Aalst. "Supporting Confidentiality in Process Mining Using Abstraction and Encryption." In Lecture Notes in Business Information Processing. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-46633-6_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Müller, Belinda. "Authentication." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_29.

Full text
Abstract:
AbstractAn authentication process is a process of verifying an entity’s identity based on one or multiple factors. A factor can be something the entity is, possesses, or knows. Depending on the number of credentials (or factors) required, the authentication process is referred to as single-factor authentication, two-factor authentication, or multifactor authentication. In choosing a particular authentication solution for organizations, it is crucial to balance security, usability, cost, and privacy considerations. The authentication solution for a particular service can be predetermined for the private individual, although stronger authentication can be enabled if desired. While these trends suggest a more secure and user-friendly authentication process, they may also introduce new privacy concerns that must be addressed.
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Xuguang, Hongbin Ma, Pujun Ji, Haiting Liu, and Yan Liu. "Based on GAN Generating Chaotic Sequence." In Communications in Computer and Information Science. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_4.

Full text
Abstract:
AbstractIn this paper, an adversarial encryption algorithm based on generating chaotic sequence by GAN is proposed. Starting from the poor leakage resistance of the basic adversarial encryption communication model based on GAN, the network structure was improved. Secondly, this paper used the generated adversarial network to generate chaotic-like sequences as the key K and entered the improved adversarial encryption model. The addition of the chaotic model further improved the security of the key. In the subsequent training process, the encryption and decryption party and the attacker confront each other and optimize, and then obtain a more secure encryption model. Finally, this paper analyzes the security of the proposed encryption scheme through the key and overall model security. After subsequent experimental tests, this encryption method can eliminate the chaotic periodicity to a certain extent and the model’s anti-attack ability has also been greatly improved. After leaking part of the key to the attacker, the secure communication can still be maintained.
APA, Harvard, Vancouver, ISO, and other styles
8

Aad, Imad. "Zero-Knowledge Proof." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_6.

Full text
Abstract:
AbstractZero-knowledge proofs are techniques to verify claims without revealing the information itself. In this process, a “prover” shares proof of their claim with a “verifier,” who then verifies the accuracy of the proof without learning any additional information. It does not prove things with certainty. Instead, the process is repeated as often as needed, eventually reaching near-certainty. Zero-knowledge proofs are still in their early days as open initiatives and standardization efforts involve industry, academia, and technical and non-technical specialist. There are different Zero-knowledge proof systems for different use cases, most of which are either being researched or open-source implementation.
APA, Harvard, Vancouver, ISO, and other styles
9

Maru, Umesh, Gajendra Sujediya, and Yashika Saini. "Color Image Encryption and Compression Using DCT in Joint Process." In Algorithms for Intelligent Systems. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5077-5_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bhatt, Vineet, Raj Kishor Bisht, and Rajesh Kumar Tripathi. "An image encryption and decryption process using singular value decomposition." In Automation and Computation. CRC Press, 2023. http://dx.doi.org/10.1201/9781003333500-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Encryption process"

1

Ariffin, Ahmad Luqman Bin Ahmad Kamal, and Kishan Vasuthevan. "The Development of Hybrid Technique for Encryption Application." In 2024 IEEE 12th Conference on Systems, Process & Control (ICSPC). IEEE, 2024. https://doi.org/10.1109/icspc63060.2024.10861952.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Naumov, I. D., and A. S. Popov. "MODELING OF THE ENCRYPTION PROCESS IN MATLAB." In Actual problems of physical and functional electronics. Ulyanovsk State Technical University, 2023. http://dx.doi.org/10.61527/appfe-2023.50-52.

Full text
Abstract:
The article presents symmetric encryption methods, such as gammations, substitutions and permutations, with an emphasis on their modeling in the MATLAB system. This environment provides powerful tools for numerical modeling and analysis, which allows researchers to better understand and evaluate the effectiveness and security of various encryption methods.
APA, Harvard, Vancouver, ISO, and other styles
3

Furka, Matus, Karol Kis, Martin Klauco, and Michal Kvasnica. "Usage of Homomorphic Encryption Algorithms in Process Control." In 2021 23rd International Conference on Process Control (PC). IEEE, 2021. http://dx.doi.org/10.1109/pc52310.2021.9447536.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kalúz, Martin, Roman Kohút, and Diana Dzurková. "MPC-Mimicking Neural Network Based on Homomorphic Encryption." In 2023 24th International Conference on Process Control (PC). IEEE, 2023. http://dx.doi.org/10.1109/pc58330.2023.10217518.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gao, Haiying, and Chao Ma. "An Adaptively Secure NIPE Scheme based on DCR Assumption." In 9th International Conference on Artificial Intelligence and Applications (AIAPP 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.120914.

Full text
Abstract:
Non-zero inner product encryption provides fine-grained access control to private data, but the existing non-zero inner product encryption schemes are mainly constructed based on the problem of bilinear groups and lattices without homomorphism. To meet the needs of users to control private data and cloud servers to directly process ciphertexts in a cloud computing environment, this paper designs a non-zero inner product encryption scheme based on the DCR assumption. Specifically, the access control policy is embedded in the ciphertext by a vector y, and the user attribute vector x is embedded
APA, Harvard, Vancouver, ISO, and other styles
6

Huang, C. K., Y. H. Hsu, W. Y. Chen, et al. "High security image encryption by two-stage process." In Signal Processing (ICICS). IEEE, 2009. http://dx.doi.org/10.1109/icics.2009.5397629.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zainuddin, Zahir, and Evanita V. Manullang. "E-lerning concept design of rijndael encryption process." In 2013 IEEE International Conference on Teaching, Assessment and Learning for Engineering (TALE). IEEE, 2013. http://dx.doi.org/10.1109/tale.2013.6654535.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chang, Rui, Liehui Jiang, Hongqi He, and Yun Zeng. "The process analysis of encryption and decryption based on process dependency graphs." In 2013 International Conference on Sport Science and Computer Science. WIT Press, 2014. http://dx.doi.org/10.2495/cccs130041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tep, Sovan, and Isara Anantavrasilp. "Robust Image Encryption Method With Cipher Stream Chaining Process." In 2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS). IEEE, 2019. http://dx.doi.org/10.1109/ccoms.2019.8821734.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Marshnil, N. Ameena, and M. C. Binish. "Image encryption based on diffusion process and multiple chaotic maps." In 2014 International Conference on Power Signals Control and Computations (EPSCICON). IEEE, 2014. http://dx.doi.org/10.1109/epscicon.2014.6887501.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Encryption process"

1

Schaad, J. CBOR Object Signing and Encryption (COSE): Structures and Process. RFC Editor, 2022. http://dx.doi.org/10.17487/rfc9052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Leathers, Emily, Clayton Thurmer, and Kendall Niles. Encryption for edge computing applications. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48596.

Full text
Abstract:
As smart sensors and the Internet of Things (IoT) exponentially expand, there is an increased need for effective processing solutions for sensor node data located in the operational arena where it can be leveraged for immediate decision support. Current developments reveal that edge computing, where processing and storage are performed close to data generation locations, can meet this need (Ahmed and Ahmed 2016). Edge computing imparts greater flexibility than that experienced in cloud computing architectures (Khan et al. 2019). Despite these benefits, the literature highlights open security i
APA, Harvard, Vancouver, ISO, and other styles
3

Mouha, Nicky. Review of the Advanced Encryption Standard. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.ir.8319.

Full text
Abstract:
The field of cryptography continues to advance at a very rapid pace, leading to new insights that may impact the security properties of cryptographic algorithms. The Crypto Publication Review Board ("the Board") has been established to identify publications to be reviewed. This report subjects the first standard to the review process: Federal Information Processing Standard (FIPS) 197, which defines the Advanced Encryption Standard (AES).
APA, Harvard, Vancouver, ISO, and other styles
4

Sonmez Turan, Meltem. Ascon-Based Lightweight Cryptography Standards for Constrained Devices. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.sp.800-232.

Full text
Abstract:
In 2023, the National Institute of Standards and Technology (NIST) announced the selection of the Ascon family of algorithms designed by Dobraunig, Eichlseder, Mendel, and Schläffer to provide efficient cryptographic solutions for resource-constrained devices. This decision emerged from a rigorous, multi-round lightweight cryptography standardization process. The Ascon family includes a suite of cryptographic primitives that provide Authenticated Encryption with Associated Data (AEAD), hash function, and eXtendable Output Function (XOF) capabilities. The Ascon family is characterized by lightw
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!