Academic literature on the topic 'INVERSION-ENCRYPTION METHOD'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'INVERSION-ENCRYPTION METHOD.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "INVERSION-ENCRYPTION METHOD"
Khan, Sajid, Lansheng Han, Ghulam Mudassir, Bachira Guehguih, and Hidayat Ullah. "3C3R, an Image Encryption Algorithm Based on BBI, 2D-CA, and SM-DNA." Entropy 21, no. 11 (2019): 1075. http://dx.doi.org/10.3390/e21111075.
Full textCheng, Peng, and Huai Xun Zhao. "A Novel Image Encryption Algorithm Based on Cellular Automata and Chaotic System." Advanced Materials Research 998-999 (July 2014): 797–801. http://dx.doi.org/10.4028/www.scientific.net/amr.998-999.797.
Full textA., Shanooja M., and Anil Kumar M. N. "A Technique for Image Encryption Using the Modular Multiplicative Inverse Property of Mersenne Primes." Symmetry 17, no. 2 (2025): 166. https://doi.org/10.3390/sym17020166.
Full textLokesh Reddy, B., and Anith Nelleri. "Single-Pixel Compressive Digital Holographic Encryption System Based on Circular Harmonic Key and Parallel Phase Shifting Digital Holography." International Journal of Optics 2022 (July 14, 2022): 1–20. http://dx.doi.org/10.1155/2022/6298010.
Full textLI, Huixian, Fulei WANG, Chun SHEN, Shiyuan LIU, and Liaojun PANG. "Small interval interpolation fitting bootstrapping method based on residue number system." Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 42, no. 5 (2024): 969–78. https://doi.org/10.1051/jnwpu/20244250969.
Full textLiao, Jia, Baihui Jiang, Peng Zhao, Lei Ning, and Liming Chen. "Unmanned Aerial Vehicle-Assisted Federated Learning Method Based on a Trusted Execution Environment." Electronics 12, no. 18 (2023): 3938. http://dx.doi.org/10.3390/electronics12183938.
Full textSun, Zhe, Weiping Li, Junxi Liang, et al. "A Blockchain-Based Fairness Guarantee Approach for Privacy-Preserving Collaborative Training in Computing Force Network." Mathematics 12, no. 5 (2024): 718. http://dx.doi.org/10.3390/math12050718.
Full textXi, Yuzhou, Yu Ning, Jie Jin, and Fei Yu. "A Dynamic Hill Cipher with Arnold Scrambling Technique for Medical Images Encryption." Mathematics 12, no. 24 (2024): 3948. https://doi.org/10.3390/math12243948.
Full textNaseer, Yasir, Tariq Shah, Dawood Shah, and Sadam Hussain. "A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes." Cryptography 3, no. 1 (2019): 6. http://dx.doi.org/10.3390/cryptography3010006.
Full textLi, Jiakun, and Wei Gao. "Hardware Optimization and System Design of Elliptic Curve Encryption Algorithm Based on FPGA." Journal of Sensors 2022 (October 11, 2022): 1–12. http://dx.doi.org/10.1155/2022/9074524.
Full textDissertations / Theses on the topic "INVERSION-ENCRYPTION METHOD"
RANI, VIJETA. "PSEUDORANDOM BINARY SEQUENCE GENERATION FOR STREAM CIPHERS." Thesis, 2012. http://dspace.dtu.ac.in:8080/jspui/handle/repository/13961.
Full textBook chapters on the topic "INVERSION-ENCRYPTION METHOD"
Rane, Jayesh, Ömer Kaya, Suraj Kumar Mallick, and Nitin Liladhar Rane. "Federated learning for edge artificial intelligence: Enhancing security, robustness, privacy, personalization, and blockchain integration in IoT." In Future Research Opportunities for Artificial Intelligence in Industry 4.0 and 5.0. Deep Science Publishing, 2024. http://dx.doi.org/10.70593/978-81-981271-0-5_3.
Full text