Journal articles on the topic 'The hybrid cryptosystem'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'The hybrid cryptosystem.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
O. "Secure Hybrid Mode-Based Cryptosystem." American Journal of Applied Sciences 9, no. 3 (2012): 289–92. http://dx.doi.org/10.3844/ajassp.2012.289.292.
Full textSong, Je-Ho, and Woo-Choun Lee. "The Design of Hybrid Cryptosystem for Smart Card." Journal of the Korea Academia-Industrial cooperation Society 12, no. 5 (2011): 2322–26. http://dx.doi.org/10.5762/kais.2011.12.5.2322.
Full textThorat, C. G., and V. S. Inamdar. "Implementation of new hybrid lightweight cryptosystem." Applied Computing and Informatics 16, no. 1/2 (2018): 195–206. http://dx.doi.org/10.1016/j.aci.2018.05.001.
Full textKareem, Shahab Wahhab, Raghad Zuhair Yousif, and Shadan Mohammed Jihad Abdalwahid. "An approach for enhancing data confidentiality in Hadoop." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 3 (2020): 1547. http://dx.doi.org/10.11591/ijeecs.v20.i3.pp1547-1555.
Full textMeshram, Chandrashekhar. "Practical IBC using Hybrid-Mode Problems: Factoring and Discrete Logarithm." Bulletin of Electrical Engineering and Informatics 4, no. 1 (2015): 73–82. http://dx.doi.org/10.11591/eei.v4i1.326.
Full textK, Leela, and Smitha Vinod. "Implementation of Digital Signature Using Hybrid Cryptosystem." International Journal of Engineering & Technology 7, no. 3.4 (2018): 34. http://dx.doi.org/10.14419/ijet.v7i3.4.14671.
Full textYousif, Raghad Z., Shahab W. Kareem, and Shadan M. Abdalwahid. "Enhancing Approach for Information Security in Hadoop." Polytechnic Journal 10, no. 1 (2020): 81–87. http://dx.doi.org/10.25156/ptj.v10n1y2020.pp81-87.
Full textHan, Kun-Hee, and Seung-Soo Shin. "A Implementation of Messenger using Hybrid Cryptosystem." Journal of the Korea Academia-Industrial cooperation Society 11, no. 10 (2010): 3942–49. http://dx.doi.org/10.5762/kais.2010.11.10.3942.
Full textRahmadani, R., H. Mawengkang, and Sutarman. "Hybrid cryptosystem RSA – CRT optimization and VMPC." Journal of Physics: Conference Series 978 (March 2018): 012041. http://dx.doi.org/10.1088/1742-6596/978/1/012041.
Full textVijay, Namrata, Kaptan Singh, and Amit Saxena. "A Hybrid Digital Signature Technique using Cryptosystem." International Journal of Computer Applications 174, no. 24 (2021): 14–20. http://dx.doi.org/10.5120/ijca2021921143.
Full textNaga Raju, D. V., and V. Vallikumari. "A Novel Hybrid Cryptosystem Based Approach for Secure Multicasting for Dynamic Groups." International Journal of Engineering and Technology 2, no. 4 (2010): 345–49. http://dx.doi.org/10.7763/ijet.2010.v2.145.
Full textZhou, Xiaoyi, Jixin Ma, Wencai Du, and Yongzhe Zhao. "Ergodic Matrix and Hybrid-key Based Image Cryptosystem." International Journal of Image, Graphics and Signal Processing 3, no. 4 (2011): 1–9. http://dx.doi.org/10.5815/ijigsp.2011.04.01.
Full textBegum, Mahbuba, Jannatul Ferdush, and Md Golam. "A Hybrid Cryptosystem using DNA, OTP and RSA." International Journal of Computer Applications 172, no. 8 (2017): 30–33. http://dx.doi.org/10.5120/ijca2017915198.
Full textReddicherla, Vikram Raju, Umashankar Rawat, Y. Jeevan Nagendra Kumar, and Atef Zaguia. "Secure Vertical Handover to NEMO Using Hybrid Cryptosystem." Security and Communication Networks 2021 (June 26, 2021): 1–12. http://dx.doi.org/10.1155/2021/6751423.
Full textTakieldeen, Ali, Said H. Abd Elkhalik, Ahmed S. Samra, Mohamed A. Mohamed, and Fahmi Khalifa. "A Robust and Hybrid Cryptosystem for Identity Authentication." Information 12, no. 3 (2021): 104. http://dx.doi.org/10.3390/info12030104.
Full textMasood, Fawad, Wadii Boulila, Jawad Ahmad, et al. "A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos." Remote Sensing 12, no. 11 (2020): 1893. http://dx.doi.org/10.3390/rs12111893.
Full textHaraty, Ramzi A., and Walid El Horr. "A hybrid cryptosystem based on WEP for 802.11 networks." Journal of Computational Methods in Sciences and Engineering 6, s2 (2007): S359—S377. http://dx.doi.org/10.3233/jcm-2006-6s213.
Full textNagar, Abhishek, Karthik Nandakumar, and Anil K. Jain. "A hybrid biometric cryptosystem for securing fingerprint minutiae templates." Pattern Recognition Letters 31, no. 8 (2010): 733–41. http://dx.doi.org/10.1016/j.patrec.2009.07.003.
Full textSinha, Aloka. "Nonlinear optical cryptosystem resistant to standard and hybrid attacks." Optics and Lasers in Engineering 81 (June 2016): 79–86. http://dx.doi.org/10.1016/j.optlaseng.2016.01.013.
Full textMohammed, Nada Qasim, Qasim Mohammed Hussein, Ahmed M. Sana, and Layth A. Khalil. "A Hybrid Approach to Design Key Generator of Cryptosystem." Journal of Computational and Theoretical Nanoscience 16, no. 3 (2019): 971–77. http://dx.doi.org/10.1166/jctn.2019.7985.
Full textRahmadani, R., T. T. A. Putri, S. Sriadhi, R. D. Sari, and H. D. Hutahaean. "Data security system using hybrid cryptosystem RC4A-RSA algorithm." IOP Conference Series: Materials Science and Engineering 830 (May 19, 2020): 032008. http://dx.doi.org/10.1088/1757-899x/830/3/032008.
Full textRachmawati, Dian, Amer Sharif, Jaysilen, and Mohammad Andri Budiman. "Hybrid Cryptosystem Using Tiny Encryption Algorithm and LUC Algorithm." IOP Conference Series: Materials Science and Engineering 300 (January 2018): 012042. http://dx.doi.org/10.1088/1757-899x/300/1/012042.
Full textSudheer, G. "A Hybrid Image Cryptosystem Based On OMFLIP Permutation Cipher." Signal & Image Processing : An International Journal 3, no. 1 (2012): 67–74. http://dx.doi.org/10.5121/sipij.2012.3106.
Full textGupta, Kamlesh, and Sanjay Silakari. "Novel Approach for fast Compressed Hybrid color image Cryptosystem." Advances in Engineering Software 49 (July 2012): 29–42. http://dx.doi.org/10.1016/j.advengsoft.2012.03.001.
Full textGafsi, Mohamed, Mohamed Ali Hajjaji, Jihene Malek, and Abdellatif Mtibaa. "Efficient Encryption System for Numerical Image Safe Transmission." Journal of Electrical and Computer Engineering 2020 (October 31, 2020): 1–12. http://dx.doi.org/10.1155/2020/8937676.
Full textHu, Zhenji, and Jiafeng Xie. "Novel Hybrid-Size Digit-Serial Systolic Multiplier over GF(2m)." Symmetry 10, no. 11 (2018): 540. http://dx.doi.org/10.3390/sym10110540.
Full textZajac, Pavol. "Hybrid Encryption from McEliece Cryptosystem with Pseudo-random Error Vector." Fundamenta Informaticae 169, no. 4 (2019): 345–60. http://dx.doi.org/10.3233/fi-2019-1851.
Full textPoriye, Monika, and Shuchita Upadhyaya. "Hybrid Cryptosystem with DNA Based Key for Wireless Sensor Networks." International Journal of Wireless & Mobile Networks 8, no. 6 (2016): 19–26. http://dx.doi.org/10.5121/ijwmn.2016.8602.
Full textErdiansyah, U., MKM Nasution, and Sawaluddin. "Hybrid cryptosystem multi-power RSA with N=PmQ and VMPC." IOP Conference Series: Materials Science and Engineering 725 (January 21, 2020): 012129. http://dx.doi.org/10.1088/1757-899x/725/1/012129.
Full textPRABAKERAN, SARAVANAN, KUMAR R. HEMANTH, T. ARVIND, and NARAYANAN BHARATH. "HYBRID CRYPTOSYSTEM USING HOMOMORPHIC ENCRYPTION AND ELLIPTIC CURVE CRYPTOGRAPHY ALGORITHM." i-manager's Journal on Computer Science 7, no. 1 (2019): 1. http://dx.doi.org/10.26634/jcom.7.1.15667.
Full textWang, Kunshu, Xiangjun Wu, Hui Wang, Haibin Kan, and Jürgen Kurths. "New color image cryptosystem via SHA-512 and hybrid domain." Multimedia Tools and Applications 80, no. 12 (2021): 18875–99. http://dx.doi.org/10.1007/s11042-021-10511-0.
Full textAnindya Dwi Putri Islamidina, Amang Sudarsono, and Titon Dutono. "Secure Data Travelling User using Hybrid Cryptosystem with User Privacy Protection." EMITTER International Journal of Engineering Technology 8, no. 1 (2020): 102–25. http://dx.doi.org/10.24003/emitter.v8i1.486.
Full textS, Kavitha, and P. J. A.Alphonse. "A Hybrid Cryptosystem to Enhance Security in IoT Health Care System." International Journal of Wireless and Microwave Technologies 9, no. 1 (2019): 1–10. http://dx.doi.org/10.5815/ijwmt.2019.01.01.
Full textRachmawati, Dian, Maya Silvi Lydia, and Wynda Arianni Siregar. "Hybrid Cryptosystem Implementation Using IDEA and Knapsack Algorithm for Message Security." Journal of Physics: Conference Series 1090 (September 2018): 012030. http://dx.doi.org/10.1088/1742-6596/1090/1/012030.
Full textSulaiman, Oris Krianto. "HYBRID CRYPTOSYSTEM MENGGUNAKAN XOR CIPHER DAN MERKLE–HELLMAN KNAPSACK UNTUK MENJAGA KERAHASIAAN PESAN DIGITAL." JURNAL TEKNOLOGI INFORMASI 3, no. 2 (2019): 169. http://dx.doi.org/10.36294/jurti.v3i2.1072.
Full textRakheja, Pankaj, Rekha Vig, and Phool Singh. "An asymmetric hybrid cryptosystem using hyperchaotic system and random decomposition in hybrid multi resolution wavelet domain." Multimedia Tools and Applications 78, no. 15 (2019): 20809–34. http://dx.doi.org/10.1007/s11042-019-7406-x.
Full textPark, ByeongGyu, Suhri Kim, Seokhie Hong, HeeSeok Kim, and Seog Chung Seo. "Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages." Applied Sciences 10, no. 5 (2020): 1831. http://dx.doi.org/10.3390/app10051831.
Full textKoppu, Srinivas, and V. Madhu Viswanatham. "A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform." Modelling and Simulation in Engineering 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/7470204.
Full textKaipa. "A HYBRID CRYPTOSYSTEM USING VARIABLE LENGTH SUB KEY GROUPS AND BYTE SUBSTITUTION." Journal of Computer Science 10, no. 2 (2014): 251–54. http://dx.doi.org/10.3844/jcssp.2014.251.254.
Full textGore, Aakash, S. S., and Preetesh Purohit. "Hybrid Cryptosystem using Modified Blowfish Algorithm and SHA Algorithm on Public Cloud." International Journal of Computer Applications 155, no. 3 (2016): 6–10. http://dx.doi.org/10.5120/ijca2016912275.
Full textMantoro, Teddy, and Andri Zakariya. "Securing E-Mail Communication Using Hybrid Cryptosystem on Android-based Mobile Devices." TELKOMNIKA (Telecommunication Computing Electronics and Control) 10, no. 4 (2012): 807. http://dx.doi.org/10.12928/telkomnika.v10i4.870.
Full textChang, Yi C., Hsuan T. Chang, and Chung J. Kuo. "Hybrid image cryptosystem based on dyadic phase displacement in the frequency domain." Optics Communications 236, no. 4-6 (2004): 245–57. http://dx.doi.org/10.1016/j.optcom.2004.03.037.
Full textHardi, S. M., J. T. Tarigan, and N. Safrina. "Hybrid cryptosystem for image file using elgamal and double playfair cipher algorithm." Journal of Physics: Conference Series 978 (March 2018): 012068. http://dx.doi.org/10.1088/1742-6596/978/1/012068.
Full textTimilsina, Suresh, and Sarmila Gautam. "Analysis of Hybrid Cryptosystem Developed Using Blowfish and ECC with Different Key Size." Technical Journal 1, no. 1 (2019): 10–15. http://dx.doi.org/10.3126/tj.v1i1.27582.
Full textSheela, S. J., K. V. Suresh, and Deepaknath Tandur. "A Novel Audio Cryptosystem Using Chaotic Maps and DNA Encoding." Journal of Computer Networks and Communications 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/2721910.
Full textlatif, Israa H., and Ergun Erçelebi. "Implementation of Hybrid Cryptosystem using AES-256 and SHA-2 256 by LabVIEW." IJARCCE 6, no. 1 (2017): 351–57. http://dx.doi.org/10.17148/ijarcce.2017.6169.
Full textWu, Chuhan, Jun Chang, Xiangxin Xu, and Yongjian Zhang. "Hybrid cryptosystem based on diffraction transfer function and phase-truncated Fourier transform encryption." Optics Communications 450 (November 2019): 87–96. http://dx.doi.org/10.1016/j.optcom.2019.05.053.
Full textHemdan, Ayman M., Osama S. Faragallah, Osama Elshakankiry, and Ahmed Elmhalaway. "A fast hybrid image cryptosystem based on random generator and modified logistic map." Multimedia Tools and Applications 78, no. 12 (2018): 16177–93. http://dx.doi.org/10.1007/s11042-018-6948-7.
Full textMa, Lihong, and Weimin Jin. "Symmetric and asymmetric hybrid cryptosystem based on compressive sensing and computer generated holography." Optics Communications 407 (January 2018): 51–56. http://dx.doi.org/10.1016/j.optcom.2017.08.047.
Full textSulaiman, Saniah, and Zurina Mohd Hanapi. "Extensive Analysis on Images Encryption using Hybrid Elliptic Curve Cryptosystem and Hill Cipher." Journal of Computer Science 17, no. 3 (2021): 221–30. http://dx.doi.org/10.3844/jcssp.2021.221.230.
Full text