Academic literature on the topic 'Iterative encryption'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Iterative encryption.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Iterative encryption"

1

Y. Wanbo, Z. Qinwu, and Z. Qingjian3. "chaotic image encryption method based on three-dimensional nonlinear system." Mustansiriyah Journal of Pure and Applied Sciences 1, no. 3 (2023): 1–27. http://dx.doi.org/10.47831/mjpas.v1i3.43.

Full text
Abstract:
Due to the simple structure of one-dimensional chaotic mapping, there may be problems such as lack of security in applying to image encryption; so many researchers have proposed some high-dimensional chaotic mapping to apply to image encryption. However, high-dimensional chaotic mapping may be difficult to be applied in practice because of its complex structure and high cost. So this paper proposes an image encryption method with a relatively simple structure, low cost, and good encryption effect. The Proposed method combines a chaotic system with 3D nonlinear function iterative systems to enc
APA, Harvard, Vancouver, ISO, and other styles
2

Kaur, Kulwinder. "Performance Evaluation of Ciphers Using CRYPTOOL 2.0." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (2012): 39–43. http://dx.doi.org/10.24297/ijct.v3i1a.2727.

Full text
Abstract:
Cryptography is an emerging technology, which is important for network security. Research on cryptography is still in its developing stages and considerable research effort is required. This paper includes the complete step by step implementation of advance encryption technique, i.e. encrypting and decrypting 128 bit data using the AES and its modification for enhanced reliability and security. The encryption process consists of the combination of various classical techniques such as substitution, rearrangement and transformation encoding technique. The encryption and decryption module include
APA, Harvard, Vancouver, ISO, and other styles
3

Liu Fu-Min, Zhai Hong-Chen, and Yang Xiao-Ping. "Kinoform-based iterative random phase encryption." Acta Physica Sinica 52, no. 10 (2003): 2462. http://dx.doi.org/10.7498/aps.52.2462.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gaur, Paavni. "AES Image Encryption (Advanced Encryption Standard)." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (2021): 1357–63. http://dx.doi.org/10.22214/ijraset.2021.39542.

Full text
Abstract:
Abstract: An Image Encryption and Decryption Using AES (Advance Encryption Standard) Algorithm is proposed in the project. Due to increasing use of image in various field, it is very important to protect the confidential image data from unauthorized access. The design uses the iterative approach with block size of 128 bit and key size of 128, 192 or 256 bit. The numbers of round for key size of 256 bits is 14 , for 128 bits is 10 and for 192 bits is 12. As secret key increases the security as well as complexity of the cryptography algorithms. In this paper , an algorithm in which the image is
APA, Harvard, Vancouver, ISO, and other styles
5

Stănică, George Cosmin, and Petre Anghelescu. "Design of a Multi-Layer Symmetric Encryption System Using Reversible Cellular Automata." Mathematics 13, no. 2 (2025): 304. https://doi.org/10.3390/math13020304.

Full text
Abstract:
The increasing demand for secure and efficient encryption algorithms has intensified the exploration of alternative cryptographic solutions, including biologically inspired systems like cellular automata. This study presents a symmetric block encryption design based on multiple reversible cellular automata (RCAs) that can assure both computational efficiency and reliable restoration of original data. The encryption key, with a length of 224 bits, is composed of specific rules used by the four distinct RCAs: three with radius-2 neighborhoods and one with a radius-3 neighborhood. By dividing pla
APA, Harvard, Vancouver, ISO, and other styles
6

Vilardy O., Juan M., Leiner Barba J., and Cesar O. Torres M. "Image Encryption and Decryption Systems Using the Jigsaw Transform and the Iterative Finite Field Cosine Transform." Photonics 6, no. 4 (2019): 121. http://dx.doi.org/10.3390/photonics6040121.

Full text
Abstract:
We propose the use of the Jigsaw transform (JT) and the iterative cosine transform over a finite field in order to encrypt and decrypt images. The JT is a nonlinear operation that allows one to increase the security over the encrypted images by adding new keys to the encryption and decryption systems. The finite field is a finite set of integer numbers where the basic mathematical operations are performed using modular arithmetic. The finite field used in the encryption and decryption systems has an order given by the Fermat prime number 257. The iterative finite field cosine transform (FFCT)
APA, Harvard, Vancouver, ISO, and other styles
7

Stoyanov, Borislav, and Gyurhan Nedzhibov. "Symmetric Key Encryption Based on Rotation-Translation Equation." Symmetry 12, no. 1 (2020): 73. http://dx.doi.org/10.3390/sym12010073.

Full text
Abstract:
In this paper, an improved encryption algorithm based on numerical methods and rotation–translation equation is proposed. We develop the new encryption-decryption algorithm by using the concept of symmetric key instead of public key. Symmetric key algorithms use the same key for both encryption and decryption. Most symmetric key encryption algorithms use either block ciphers or stream ciphers. Our goal in this work is to improve an existing encryption algorithm by using a faster convergent iterative method, providing secure convergence of the corresponding numerical scheme, and improved securi
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Huijuan, and Yurong Wang. "Double-image encryption based on iterative gyrator transform." Optics Communications 281, no. 23 (2008): 5745–49. http://dx.doi.org/10.1016/j.optcom.2008.09.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Yan, Cheng-Han Zheng, and Naohiro Tanno. "Optical encryption based on iterative fractional Fourier transform." Optics Communications 202, no. 4-6 (2002): 277–85. http://dx.doi.org/10.1016/s0030-4018(02)01113-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Zhengjun, and Shutian Liu. "Double image encryption based on iterative fractional Fourier transform." Optics Communications 275, no. 2 (2007): 324–29. http://dx.doi.org/10.1016/j.optcom.2007.03.039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Iterative encryption"

1

Sampath, Sowrirajan. "FPGA based Hardware Implementation of Advanced Encryption Standard." Wright State University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=wright1189835736.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Smékal, David. "Zabezpečení vysokorychlostních komunikačních systémů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-220420.

Full text
Abstract:
The diploma thesis deals with 128–bit AES data encryption and its implementation in FPGA network card using VHDL programming language. The theoretical part explains AES encryption and decryption, its individual steps and operating modes. Further was described the VHDL programming language, development environment Vivado, FPGA network card Combo–80G and configurable framework NetCOPE. The practical part is the implementation of AES–128 in VHDL. A simulation was used to eliminate errors, then the synthesis was performed. These steps were made using Vivado software. Last step of practical part wa
APA, Harvard, Vancouver, ISO, and other styles
3

Su, Chien-Ming, and 蘇建銘. "An Iterative Image Encryption Research Based on the Dyadic Displacement and Linear Feedback Shift Register in Discrete Wavelet Domain." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/36152869352054755313.

Full text
Abstract:
碩士<br>高苑科技大學<br>電子工程研究所<br>102<br>In recent years, due to explosive development of Internet technology, a great deal of multimedia (images, sounds, videos, etc.) data message is delivering on internet. But in the process how we ensure the security of such information, it has become a problem of concern to the people. At present, image encryption technologies are gaining more and more attentions for researchers. Since the digital images can be transmitted through the Internet, it indirectly generate images safety issues. Image encryption is a way that can ensure the safety of image. However, th
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Iterative encryption"

1

Kumar, Malay, and Manu Vardhan. "Data Confidentiality and Integrity Preserving Outsourcing Algorithm for System of Linear Equation to a Malicious Cloud Server." In Big Data Management and the Internet of Things for Improved Health Systems. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5222-2.ch003.

Full text
Abstract:
Cloud computing has become a revolution in the field of computing, which enables flexible, on-demand, usage of computing resources in pay-as-per-use model. However, data and computation go to some third-party cloud server beyond the physical control of client escalates various privacy and security concern. This paper proposes an improved outsourcing algorithm for system of linear equation (SLE). The improvements are first, the existing work uses expensive cryptographic computation such as Paillier encryption for security arrangement, the proposed solution does not use such cryptographic primit
APA, Harvard, Vancouver, ISO, and other styles
2

Sindiramutty, Siva Raja, Krishna Raj V. Prabagaran, Rehan Akbar, Manzoor Hussain, and Nazir Ahmed Malik. "Generative AI for Secure User Interface (UI) Design." In Advances in Information Security, Privacy, and Ethics. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-5415-5.ch010.

Full text
Abstract:
Generative AI, which is equipped with unique capabilities, is about to put the world of secure user interface (UI) design upside down and turn it into something full of endless possibilities in which users will be able to use the same opportunities and experienced solutions to protect their interaction in digital from any future security threats. This chapter takes a deep plunge into the merger of the generative AI with the secure user interface design, on the whole, presenting a complete exposition of the principals involved, methodologies applied, practical embodiment, and ultimate ramificat
APA, Harvard, Vancouver, ISO, and other styles
3

Dua, Mohit, Shelza Dua, Priyanka Jaroli, and Ankita Bisht. "An Improved Approach for Multiple Image Encryption Using Alternate Multidimensional Chaos and Lorenz Attractor." In Handbook of Research on Machine Learning Techniques for Pattern Recognition and Information Security. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3299-7.ch009.

Full text
Abstract:
This chapter proposes a multiple image encryption method based on multi-dimensional chaotic equations. Four-dimensional differential chaotic equations of Lorenz attractor have been used to generate the initial security key, and alternate logistic maps have been used for encryption. Initially, three input images are used in a matrix form, where size of each image is M×N, and a composite image is derived by combining the one dimensional matrix of the input images, where size of the composite image matrix is 3×(M×N). Secondly, Lorenz attractor (LA) generates the security key using the composite m
APA, Harvard, Vancouver, ISO, and other styles
4

S., Abarna, Naskath J., Rathi Pathi R., and Jeyalakshmi C. "Secure VANET Routing Protocols for Improved Vehicular Communication in Autonomous Systems." In Modeling, Simulation, and Control of AI Robotics and Autonomous Systems. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-1962-8.ch007.

Full text
Abstract:
Vehicular ad hoc networks (VANETs) represent an advanced iteration of mobile ad hoc networks (MANETs) designed specifically for internet communication within vehicles. VANETs aim to enable vehicle-to-vehicle (V2V) communication, enhancing safety and convenience for drivers and passengers. However, the open nature of ad hoc networks and the absence of a well-defined line of defense make security a crucial concern for VANETs. Prior to deploying mobile ad hoc networks in hostile or sensitive areas, it becomes imperative to establish robust security services. This study addresses the need for a tr
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Iterative encryption"

1

Wang, Juan, and Boyong Gao. "Bidirectional Iterative Diffusion Encryption Algorithm Based on Improved Chaotic Systems." In 2024 International Conference on Image Processing, Computer Vision and Machine Learning (ICICML). IEEE, 2024. https://doi.org/10.1109/icicml63543.2024.10957771.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Stutz, Thomas, and Andreas Uhl. "On Format-Compliant Iterative Encryption of JPEG2000." In Eighth IEEE International Symposium on Multimedia (ISM'06). IEEE, 2006. http://dx.doi.org/10.1109/ism.2006.119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mermoul, Atef. "An iterative speech encryption scheme based on subspace technique." In 2011 7th International Workshop on Systems, Signal Processing and their Applications (WOSSPA). IEEE, 2011. http://dx.doi.org/10.1109/wosspa.2011.5931512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bing-cheng, Qiu, Yao Yang-xin, Zhang Xi-min, and Chen Yin-dong. "Iterative Composite Encryption Algorithm Based on Tea and Elgamal." In 2009 WRI World Congress on Computer Science and Information Engineering. IEEE, 2009. http://dx.doi.org/10.1109/csie.2009.744.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wu Pan and Jing Qiao. "An iterative optical image encryption based on double random phase." In 2010 International Conference on Computer Application and System Modeling (ICCASM 2010). IEEE, 2010. http://dx.doi.org/10.1109/iccasm.2010.5622403.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Liansheng, Sui, and Gao Bo. "Single-Channel Color Image Encryption Based on Iterative Fractional Fourier Transform." In 2012 Fourth International Symposium on Information Science and Engineering (ISISE). IEEE, 2012. http://dx.doi.org/10.1109/isise.2012.72.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Ren. "Iterative Encryption Method of Transmission Data Anti-Tampering Based on Big Data." In 2019 International Conference on Virtual Reality and Intelligent Systems (ICVRIS). IEEE, 2019. http://dx.doi.org/10.1109/icvris.2019.00036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sui, Liansheng, and Kuaikuai Duan. "Color image encryption using iterative phase retrieve process in quaternion Fourier transform domain." In The International Conference on Photonics and Optical Engineering and the Annual West China Photonics Conference (icPOE 2014), edited by Ailing Tian, Anand Asundi, Weiguo Liu, and Chunmin Zhang. SPIE, 2015. http://dx.doi.org/10.1117/12.2075399.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Xie, Yanlu, Shihua Zhou, Hui Lv, Bin Wang, Chao Che, and Qiang Zhang. "A Color Image Encryption Algorithm Based on Complementary Map and Iterative Convolutional Code." In ICMLSC 2024: 2024 The 8th International Conference on Machine Learning and Soft Computing. ACM, 2024. http://dx.doi.org/10.1145/3647750.3647779.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, B., Jun Sang, and Mohammad S. Alam. "An image hiding method based on cascaded iterative Fourier transform and public-key encryption algorithm." In SPIE Defense, Security, and Sensing, edited by David Casasent and Tien-Hsin Chao. SPIE, 2013. http://dx.doi.org/10.1117/12.2018257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!