Journal articles on the topic 'Iterative encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Iterative encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Y. Wanbo, Z. Qinwu, and Z. Qingjian3. "chaotic image encryption method based on three-dimensional nonlinear system." Mustansiriyah Journal of Pure and Applied Sciences 1, no. 3 (2023): 1–27. http://dx.doi.org/10.47831/mjpas.v1i3.43.
Full textKaur, Kulwinder. "Performance Evaluation of Ciphers Using CRYPTOOL 2.0." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (2012): 39–43. http://dx.doi.org/10.24297/ijct.v3i1a.2727.
Full textLiu Fu-Min, Zhai Hong-Chen, and Yang Xiao-Ping. "Kinoform-based iterative random phase encryption." Acta Physica Sinica 52, no. 10 (2003): 2462. http://dx.doi.org/10.7498/aps.52.2462.
Full textGaur, Paavni. "AES Image Encryption (Advanced Encryption Standard)." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (2021): 1357–63. http://dx.doi.org/10.22214/ijraset.2021.39542.
Full textStănică, George Cosmin, and Petre Anghelescu. "Design of a Multi-Layer Symmetric Encryption System Using Reversible Cellular Automata." Mathematics 13, no. 2 (2025): 304. https://doi.org/10.3390/math13020304.
Full textVilardy O., Juan M., Leiner Barba J., and Cesar O. Torres M. "Image Encryption and Decryption Systems Using the Jigsaw Transform and the Iterative Finite Field Cosine Transform." Photonics 6, no. 4 (2019): 121. http://dx.doi.org/10.3390/photonics6040121.
Full textStoyanov, Borislav, and Gyurhan Nedzhibov. "Symmetric Key Encryption Based on Rotation-Translation Equation." Symmetry 12, no. 1 (2020): 73. http://dx.doi.org/10.3390/sym12010073.
Full textLi, Huijuan, and Yurong Wang. "Double-image encryption based on iterative gyrator transform." Optics Communications 281, no. 23 (2008): 5745–49. http://dx.doi.org/10.1016/j.optcom.2008.09.001.
Full textZhang, Yan, Cheng-Han Zheng, and Naohiro Tanno. "Optical encryption based on iterative fractional Fourier transform." Optics Communications 202, no. 4-6 (2002): 277–85. http://dx.doi.org/10.1016/s0030-4018(02)01113-6.
Full textLiu, Zhengjun, and Shutian Liu. "Double image encryption based on iterative fractional Fourier transform." Optics Communications 275, no. 2 (2007): 324–29. http://dx.doi.org/10.1016/j.optcom.2007.03.039.
Full textFrançois, Michael, Thomas Grosges, Dominique Barchiesi, and Robert Erra. "Image Encryption Algorithm Based on a Chaotic Iterative Process." Applied Mathematics 03, no. 12 (2012): 1910–20. http://dx.doi.org/10.4236/am.2012.312262.
Full textWANG, XING-YUAN, and XIAO-JUAN WANG. "A NEW CHAOTIC ENCRYPTION ALGORITHM BASED ON THE ERGODICITY OF CHAOS." International Journal of Modern Physics B 25, no. 15 (2011): 2047–53. http://dx.doi.org/10.1142/s0217979211100825.
Full textVashisth, Sunanda, Hukum Singh, A. K. Yadav, and Kehar Singh. "Devil’s Vortex Phase Structure as Frequency Plane Mask for Image Encryption Using the Fractional Mellin Transform." International Journal of Optics 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/728056.
Full textPatil, S. Ankitha. "A Novel Chaotic Image Encryption Algorithm based on Coordinate Descent and SHA-256." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 1451–56. https://doi.org/10.22214/ijraset.2025.67447.
Full textDeng, Miaolei. "Hybrid Encryption Algorithm for Sensitive Information of College Physical Fitness in Cloud Storage Environment." Journal of Sensors 2022 (September 10, 2022): 1–10. http://dx.doi.org/10.1155/2022/1552437.
Full textYe, Qing, Qiaojia Zhang, Sijie Liu, and Kaiqiang Chen. "A novel chaotic system based on coupled map lattice and its application in HEVC encryption." Mathematical Biosciences and Engineering 18, no. 6 (2021): 9410–29. http://dx.doi.org/10.3934/mbe.2021463.
Full textSeo, Dong-Hoan, Sung-Geun Lee, and Yoon-Sik Kim. "Practical Encryption and Decryption System using Iterative Phase Wrapping Method." Journal of the Korean Society of Marine Engineering 32, no. 6 (2008): 955–63. http://dx.doi.org/10.5916/jkosme.2008.32.6.955.
Full textQian, Sheng-Xia, Yongnan Li, Ling-Jun Kong, et al. "Security enhancement of double-random phase encryption by iterative algorithm." Journal of Optics 16, no. 8 (2014): 085401. http://dx.doi.org/10.1088/2040-8978/16/8/085401.
Full textGuo, Changliang, Shi Liu, and John T. Sheridan. "Iterative phase retrieval algorithms Part II: Attacking optical encryption systems." Applied Optics 54, no. 15 (2015): 4709. http://dx.doi.org/10.1364/ao.54.004709.
Full textGuo, Cheng, Ce Wei, Jiubin Tan, et al. "A review of iterative phase retrieval for measurement and encryption." Optics and Lasers in Engineering 89 (February 2017): 2–12. http://dx.doi.org/10.1016/j.optlaseng.2016.03.021.
Full textWANG, XING-YUAN, and TIAN WANG. "A NOVEL ALGORITHM FOR IMAGE ENCRYPTION BASED ON COUPLE CHAOTIC SYSTEMS." International Journal of Modern Physics B 26, no. 30 (2012): 1250175. http://dx.doi.org/10.1142/s0217979212501755.
Full textAbbas, Zamil Hussain, and Abid Ali Khodher Maisa'a. "Medical image encryption using multi chaotic maps." TELKOMNIKA (Telecommunication, Computing, Electronics and Control) 21, no. 3 (2023): 556–65. https://doi.org/10.12928/telkomnika.v21i3.24324.
Full textFeng, Luoyin, Jize Du, and Chong Fu. "Double graph correlation encryption based on hyperchaos." PLOS ONE 18, no. 9 (2023): e0291759. http://dx.doi.org/10.1371/journal.pone.0291759.
Full textVidyashree H R. "Symmetric Key Encryption Using Modular Traversal of Ananta-Graphs." Journal of Information Systems Engineering and Management 10, no. 44s (2025): 823–31. https://doi.org/10.52783/jisem.v10i44s.8673.
Full textChandra, Marutesh, and Pankaj Sharma. "Image Encryption based on Random Scrambling and Chaotic Gauss Iterative Map." International Journal of Computer Applications 157, no. 3 (2017): 18–23. http://dx.doi.org/10.5120/ijca2017912647.
Full textRomanko, D. A., and V. M. Fomichev. "On mathematical models of key mixing for iterative block encryption algorithms." Prikladnaya diskretnaya matematika. Prilozhenie, no. 10 (September 1, 2017): 93–96. http://dx.doi.org/10.17223/2226308x/10/38.
Full textAlattar, Munqath H., Ali Al Farawn, and Nabeel Salih Ali. "Anti-continuous collisions user-based unpredictable iterative password salted hash encryption." International Journal of Internet Technology and Secured Transactions 8, no. 4 (2018): 619. http://dx.doi.org/10.1504/ijitst.2018.095944.
Full textAl Farawn, Ali, Nabeel Salih Ali, and Munqath Alattar. "Anti-Continuous Collisions User Based Unpredictable Iterative Password Salted Hash Encryption." International Journal of Internet Technology and Secured Transactions 1, no. 1 (2019): 1. http://dx.doi.org/10.1504/ijitst.2019.10011565.
Full textKorchynskyi, Volodymyr, Valerii Hordiichuk, Vitalii Kildishev, Oleksandr Riabukha, Sergii Staikutsa, and Khaled Alfaiomi. "Method of information protection based on the integration of probabilistic encryption and noise immune coding." Radioelectronic and Computer Systems, no. 4 (December 6, 2023): 184–95. http://dx.doi.org/10.32620/reks.2023.4.13.
Full textStănică, George Cosmin, and Petre Anghelescu. "Multi-Layer Cryptosystem Using Reversible Cellular Automata." Electronics 14, no. 13 (2025): 2627. https://doi.org/10.3390/electronics14132627.
Full textSharma, Bhavana, Hukum Singh, Pankaj Rakheja1, and Mehak Khurana. "Non-linear cryptosystem utilizing biological mutation operation in the two-dimensional non-separable linear canonical transform domain." Optica Applicata 54, no. 4 (2025): 581–607. https://doi.org/10.37190/oa/194974.
Full textDZHULIY, V., I. MULYAR, V. ORLENKO, V. TITOVA, and V. ANIKIN. "SYMMETRIC CRYPTOSYSTEM WITH NONLINEAR ENCRYPTION AND THE POSSIBILITY OF CONTROL OF CIPHERTEXT FOR CONCEALMENT." Herald of Khmelnytskyi National University. Technical sciences 291, no. 6 (2020): 33–38. https://doi.org/10.31891/2307-5732-2020-291-6-33-38.
Full textLiu, Shu Cong, Yan Xing Song, and Rui Hong Yu. "The Application of Oversampled Chebyshev Chaotic Sequences in Voice Communication Encryption." Advanced Materials Research 655-657 (January 2013): 1745–49. http://dx.doi.org/10.4028/www.scientific.net/amr.655-657.1745.
Full textSharma, Vijay K., Saurabh Kumar, and K. K. Mahapatra. "Iterative and Fully Pipelined High Throughput Efficient Architectures of AES in FPGA and ASIC." Journal of Circuits, Systems and Computers 25, no. 05 (2016): 1650049. http://dx.doi.org/10.1142/s0218126616500493.
Full textP.Ghodake, Asha, and Sujata Mendgudle. "Security and Privacy of Image by Encryption, Lossy Compression and Iterative Reconstruction." International Journal of Computer Applications 62, no. 1 (2013): 16–20. http://dx.doi.org/10.5120/10044-4628.
Full textLu, Zhe, Wenjin Lv, Yupeng Zhu, et al. "Optical information encryption based on partially-update iterative system with azimuth multiplexing." Optics Communications 510 (May 2022): 127899. http://dx.doi.org/10.1016/j.optcom.2022.127899.
Full textLiu, Zhengjun, Qing Guo, Lie Xu, Muhammad Ashfaq Ahmad, and Shutian Liu. "Double image encryption by using iterative random binary encoding in gyrator domains." Optics Express 18, no. 11 (2010): 12033. http://dx.doi.org/10.1364/oe.18.012033.
Full textLi, Huijuan, and Yurong Wang. "Double-image encryption by iterative phase retrieval algorithm in fractional Fourier domain." Journal of Modern Optics 55, no. 21 (2008): 3601–9. http://dx.doi.org/10.1080/09500340802361333.
Full textWang, Han, Jian Wang, Ya-Cong Geng, Yan Song, and Ji-Qiang Liu. "Quantum Image Encryption Based on Iterative Framework of Frequency-Spatial Domain Transforms." International Journal of Theoretical Physics 56, no. 10 (2017): 3029–49. http://dx.doi.org/10.1007/s10773-017-3469-5.
Full textTrang, Hoang, and Nguyen Van Loi. "Low-Latency, Small-Area FPGA Implementation of the Advanced Encryption Standard Algorithm." International Journal of Distributed Systems and Technologies 4, no. 1 (2013): 56–77. http://dx.doi.org/10.4018/jdst.2013010105.
Full textLiu, Wenhao, Kehui Sun, Yi He, and Mengyao Yu. "Color Image Encryption Using Three-Dimensional Sine ICMIC Modulation Map and DNA Sequence Operations." International Journal of Bifurcation and Chaos 27, no. 11 (2017): 1750171. http://dx.doi.org/10.1142/s0218127417501711.
Full textYang, Feifei, Xinlei An, and Li xiong. "A new discrete chaotic map application in image encryption algorithm." Physica Scripta 97, no. 3 (2022): 035202. http://dx.doi.org/10.1088/1402-4896/ac4fd0.
Full textShravani Amar. "Shielded conveyance of Gut Medical Data in IoMT Networks Using Dual Mode Cryptography and Image Steganography Techniques." Journal of Information Systems Engineering and Management 10, no. 16s (2025): 806–21. https://doi.org/10.52783/jisem.v10i16s.2667.
Full textLi, Hong Ye, Guang Hui Cai, Hong Chao Sun, and Xiao Cong Ma. "Design and Implementation of AES Key Generator Based on FPGA." Advanced Materials Research 1022 (August 2014): 104–7. http://dx.doi.org/10.4028/www.scientific.net/amr.1022.104.
Full textRavikiran, Dr P., M. Gnaneshwar, Enje Hepsibha, and Sudhesh Srivastav. "FPGA Implementation of 256-Bit Key AES Algorithm." International Journal for Research in Applied Science and Engineering Technology, no. 6 (June 30, 2024): 282–91. http://dx.doi.org/10.22214/ijraset.2024.63028.
Full textLi, Juan. "A Symmetric Cryptography Algorithm in Wireless Sensor Network Security." International Journal of Online Engineering (iJOE) 13, no. 11 (2017): 102. http://dx.doi.org/10.3991/ijoe.v13i11.7752.
Full textLiansheng, Sui, Cheng Yin, Li Bing, Tian Ailing, and Anand Krishna Asundi. "Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval." Laser Physics Letters 15, no. 7 (2018): 075204. http://dx.doi.org/10.1088/1612-202x/aac002.
Full textShao, Zhuhong, Huazhong Shu, Jiasong Wu, Zhifang Dong, Gouenou Coatrieux, and Jean Louis Coatrieux. "Double color image encryption using iterative phase retrieval algorithm in quaternion gyrator domain." Optics Express 22, no. 5 (2014): 4932. http://dx.doi.org/10.1364/oe.22.004932.
Full textSui, Liansheng, and Bo Gao. "Single-channel color image encryption based on iterative fractional Fourier transform and chaos." Optics & Laser Technology 48 (June 2013): 117–27. http://dx.doi.org/10.1016/j.optlastec.2012.10.016.
Full textLiu, Zhengjun, Lie Xu, Chuang Lin, Jingmin Dai, and Shutian Liu. "Image encryption scheme by using iterative random phase encoding in gyrator transform domains." Optics and Lasers in Engineering 49, no. 4 (2011): 542–46. http://dx.doi.org/10.1016/j.optlaseng.2010.12.005.
Full text