Academic literature on the topic 'Iterative encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Iterative encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Iterative encryption"
Y. Wanbo, Z. Qinwu, and Z. Qingjian3. "chaotic image encryption method based on three-dimensional nonlinear system." Mustansiriyah Journal of Pure and Applied Sciences 1, no. 3 (2023): 1–27. http://dx.doi.org/10.47831/mjpas.v1i3.43.
Full textKaur, Kulwinder. "Performance Evaluation of Ciphers Using CRYPTOOL 2.0." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (2012): 39–43. http://dx.doi.org/10.24297/ijct.v3i1a.2727.
Full textLiu Fu-Min, Zhai Hong-Chen, and Yang Xiao-Ping. "Kinoform-based iterative random phase encryption." Acta Physica Sinica 52, no. 10 (2003): 2462. http://dx.doi.org/10.7498/aps.52.2462.
Full textGaur, Paavni. "AES Image Encryption (Advanced Encryption Standard)." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (2021): 1357–63. http://dx.doi.org/10.22214/ijraset.2021.39542.
Full textStănică, George Cosmin, and Petre Anghelescu. "Design of a Multi-Layer Symmetric Encryption System Using Reversible Cellular Automata." Mathematics 13, no. 2 (2025): 304. https://doi.org/10.3390/math13020304.
Full textVilardy O., Juan M., Leiner Barba J., and Cesar O. Torres M. "Image Encryption and Decryption Systems Using the Jigsaw Transform and the Iterative Finite Field Cosine Transform." Photonics 6, no. 4 (2019): 121. http://dx.doi.org/10.3390/photonics6040121.
Full textStoyanov, Borislav, and Gyurhan Nedzhibov. "Symmetric Key Encryption Based on Rotation-Translation Equation." Symmetry 12, no. 1 (2020): 73. http://dx.doi.org/10.3390/sym12010073.
Full textLi, Huijuan, and Yurong Wang. "Double-image encryption based on iterative gyrator transform." Optics Communications 281, no. 23 (2008): 5745–49. http://dx.doi.org/10.1016/j.optcom.2008.09.001.
Full textZhang, Yan, Cheng-Han Zheng, and Naohiro Tanno. "Optical encryption based on iterative fractional Fourier transform." Optics Communications 202, no. 4-6 (2002): 277–85. http://dx.doi.org/10.1016/s0030-4018(02)01113-6.
Full textLiu, Zhengjun, and Shutian Liu. "Double image encryption based on iterative fractional Fourier transform." Optics Communications 275, no. 2 (2007): 324–29. http://dx.doi.org/10.1016/j.optcom.2007.03.039.
Full textDissertations / Theses on the topic "Iterative encryption"
Sampath, Sowrirajan. "FPGA based Hardware Implementation of Advanced Encryption Standard." Wright State University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=wright1189835736.
Full textSmékal, David. "Zabezpečení vysokorychlostních komunikačních systémů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-220420.
Full textSu, Chien-Ming, and 蘇建銘. "An Iterative Image Encryption Research Based on the Dyadic Displacement and Linear Feedback Shift Register in Discrete Wavelet Domain." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/36152869352054755313.
Full textBook chapters on the topic "Iterative encryption"
Kumar, Malay, and Manu Vardhan. "Data Confidentiality and Integrity Preserving Outsourcing Algorithm for System of Linear Equation to a Malicious Cloud Server." In Big Data Management and the Internet of Things for Improved Health Systems. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5222-2.ch003.
Full textSindiramutty, Siva Raja, Krishna Raj V. Prabagaran, Rehan Akbar, Manzoor Hussain, and Nazir Ahmed Malik. "Generative AI for Secure User Interface (UI) Design." In Advances in Information Security, Privacy, and Ethics. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-5415-5.ch010.
Full textDua, Mohit, Shelza Dua, Priyanka Jaroli, and Ankita Bisht. "An Improved Approach for Multiple Image Encryption Using Alternate Multidimensional Chaos and Lorenz Attractor." In Handbook of Research on Machine Learning Techniques for Pattern Recognition and Information Security. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3299-7.ch009.
Full textS., Abarna, Naskath J., Rathi Pathi R., and Jeyalakshmi C. "Secure VANET Routing Protocols for Improved Vehicular Communication in Autonomous Systems." In Modeling, Simulation, and Control of AI Robotics and Autonomous Systems. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-1962-8.ch007.
Full textConference papers on the topic "Iterative encryption"
Wang, Juan, and Boyong Gao. "Bidirectional Iterative Diffusion Encryption Algorithm Based on Improved Chaotic Systems." In 2024 International Conference on Image Processing, Computer Vision and Machine Learning (ICICML). IEEE, 2024. https://doi.org/10.1109/icicml63543.2024.10957771.
Full textStutz, Thomas, and Andreas Uhl. "On Format-Compliant Iterative Encryption of JPEG2000." In Eighth IEEE International Symposium on Multimedia (ISM'06). IEEE, 2006. http://dx.doi.org/10.1109/ism.2006.119.
Full textMermoul, Atef. "An iterative speech encryption scheme based on subspace technique." In 2011 7th International Workshop on Systems, Signal Processing and their Applications (WOSSPA). IEEE, 2011. http://dx.doi.org/10.1109/wosspa.2011.5931512.
Full textBing-cheng, Qiu, Yao Yang-xin, Zhang Xi-min, and Chen Yin-dong. "Iterative Composite Encryption Algorithm Based on Tea and Elgamal." In 2009 WRI World Congress on Computer Science and Information Engineering. IEEE, 2009. http://dx.doi.org/10.1109/csie.2009.744.
Full textWu Pan and Jing Qiao. "An iterative optical image encryption based on double random phase." In 2010 International Conference on Computer Application and System Modeling (ICCASM 2010). IEEE, 2010. http://dx.doi.org/10.1109/iccasm.2010.5622403.
Full textLiansheng, Sui, and Gao Bo. "Single-Channel Color Image Encryption Based on Iterative Fractional Fourier Transform." In 2012 Fourth International Symposium on Information Science and Engineering (ISISE). IEEE, 2012. http://dx.doi.org/10.1109/isise.2012.72.
Full textWang, Ren. "Iterative Encryption Method of Transmission Data Anti-Tampering Based on Big Data." In 2019 International Conference on Virtual Reality and Intelligent Systems (ICVRIS). IEEE, 2019. http://dx.doi.org/10.1109/icvris.2019.00036.
Full textSui, Liansheng, and Kuaikuai Duan. "Color image encryption using iterative phase retrieve process in quaternion Fourier transform domain." In The International Conference on Photonics and Optical Engineering and the Annual West China Photonics Conference (icPOE 2014), edited by Ailing Tian, Anand Asundi, Weiguo Liu, and Chunmin Zhang. SPIE, 2015. http://dx.doi.org/10.1117/12.2075399.
Full textXie, Yanlu, Shihua Zhou, Hui Lv, Bin Wang, Chao Che, and Qiang Zhang. "A Color Image Encryption Algorithm Based on Complementary Map and Iterative Convolutional Code." In ICMLSC 2024: 2024 The 8th International Conference on Machine Learning and Soft Computing. ACM, 2024. http://dx.doi.org/10.1145/3647750.3647779.
Full textZhang, B., Jun Sang, and Mohammad S. Alam. "An image hiding method based on cascaded iterative Fourier transform and public-key encryption algorithm." In SPIE Defense, Security, and Sensing, edited by David Casasent and Tien-Hsin Chao. SPIE, 2013. http://dx.doi.org/10.1117/12.2018257.
Full text