To see the other types of publications on this topic, follow the link: The hybrid cryptosystem.

Journal articles on the topic 'The hybrid cryptosystem'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'The hybrid cryptosystem.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

O. "Secure Hybrid Mode-Based Cryptosystem." American Journal of Applied Sciences 9, no. 3 (2012): 289–92. http://dx.doi.org/10.3844/ajassp.2012.289.292.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Song, Je-Ho, and Woo-Choun Lee. "The Design of Hybrid Cryptosystem for Smart Card." Journal of the Korea Academia-Industrial cooperation Society 12, no. 5 (2011): 2322–26. http://dx.doi.org/10.5762/kais.2011.12.5.2322.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Thorat, C. G., and V. S. Inamdar. "Implementation of new hybrid lightweight cryptosystem." Applied Computing and Informatics 16, no. 1/2 (2018): 195–206. http://dx.doi.org/10.1016/j.aci.2018.05.001.

Full text
Abstract:
Embedded systems, Internet of Things (IoT) and mobile computing devices are used in various domains which include public-private infrastructure, industrial installation and critical environment. Generally, information handled by these devices is private and critical. Therefore, it must be appropriately secured from different attacks and hackers. Lightweight cryptography is an aspiring field which investigates the implementation of cryptographic primitives and algorithms for resource constrained devices. In this paper, a new compact hybrid lightweight encryption technique has been proposed. Pro
APA, Harvard, Vancouver, ISO, and other styles
4

Kareem, Shahab Wahhab, Raghad Zuhair Yousif, and Shadan Mohammed Jihad Abdalwahid. "An approach for enhancing data confidentiality in Hadoop." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 3 (2020): 1547. http://dx.doi.org/10.11591/ijeecs.v20.i3.pp1547-1555.

Full text
Abstract:
<p class="Abstract">The amount of data processed and stored in the cloud is growing dramatically. The traditional storage devices at both hardware and software levels cannot meet the requirement of the cloud. This fact motivates the need for a platform which can handle this problem. Hadoop is a deployed platform proposed to overcome this big data problem which often uses MapReduce architecture to process vast amounts of data of the cloud system. Hadoop has no strategy to assure the safety and confidentiality of the files saved inside the Hadoop distributed File system(HDFS). In the cloud
APA, Harvard, Vancouver, ISO, and other styles
5

Meshram, Chandrashekhar. "Practical IBC using Hybrid-Mode Problems: Factoring and Discrete Logarithm." Bulletin of Electrical Engineering and Informatics 4, no. 1 (2015): 73–82. http://dx.doi.org/10.11591/eei.v4i1.326.

Full text
Abstract:
Shamir proposed the concept of the ID-based cryptosystem (IBC) in 1984. Instead of generating and publishing a public key for each user, the ID-based scheme permits each user to choose his name or network address as his public key. This is advantageous to public-key cryptosystems because the public-key verification is so easy and direct. In such a way, a large public key file is not required. Since new cryptographic schemes always face security challenges and many integer factorization problem and discrete logarithm based cryptographic systems have been deployed, therefore, the purpose of this
APA, Harvard, Vancouver, ISO, and other styles
6

K, Leela, and Smitha Vinod. "Implementation of Digital Signature Using Hybrid Cryptosystem." International Journal of Engineering & Technology 7, no. 3.4 (2018): 34. http://dx.doi.org/10.14419/ijet.v7i3.4.14671.

Full text
Abstract:
Security is a major concern when it comes to electronic data transfer. Digital signature uses hash function and asymmetric algorithms to uniquely identify the sender of the data and it also ensures integrity of the data transferred. Hybrid encryption uses both symmetric and asymmetric cryptography to enhance the security of the data. Digital Signature is used to identify the owner of the document but it does not hide the information while transferring the document. Anyone can read the message. To avoid this, data sent along with the signature should be secured. In this paper, Digital signature
APA, Harvard, Vancouver, ISO, and other styles
7

Yousif, Raghad Z., Shahab W. Kareem, and Shadan M. Abdalwahid. "Enhancing Approach for Information Security in Hadoop." Polytechnic Journal 10, no. 1 (2020): 81–87. http://dx.doi.org/10.25156/ptj.v10n1y2020.pp81-87.

Full text
Abstract:
Developing a confident Hadoop essentially a cloud computing is an essential challenge as the cloud. The protection policy can be utilized during various cloud services such as Platform as a Service (PaaS), Infrastructure as a Service (IaaS), and Software as a Service (SaaS) and also can support most requirements in cloud computing. This event motivates the need of a policy which will control these challenges. Hadoop may be a used policy recommended to beat this big data problem which usually utilizes MapReduce design to arrange huge amounts of information of the cloud system. Hadoop has no pol
APA, Harvard, Vancouver, ISO, and other styles
8

Han, Kun-Hee, and Seung-Soo Shin. "A Implementation of Messenger using Hybrid Cryptosystem." Journal of the Korea Academia-Industrial cooperation Society 11, no. 10 (2010): 3942–49. http://dx.doi.org/10.5762/kais.2010.11.10.3942.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rahmadani, R., H. Mawengkang, and Sutarman. "Hybrid cryptosystem RSA – CRT optimization and VMPC." Journal of Physics: Conference Series 978 (March 2018): 012041. http://dx.doi.org/10.1088/1742-6596/978/1/012041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vijay, Namrata, Kaptan Singh, and Amit Saxena. "A Hybrid Digital Signature Technique using Cryptosystem." International Journal of Computer Applications 174, no. 24 (2021): 14–20. http://dx.doi.org/10.5120/ijca2021921143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Naga Raju, D. V., and V. Vallikumari. "A Novel Hybrid Cryptosystem Based Approach for Secure Multicasting for Dynamic Groups." International Journal of Engineering and Technology 2, no. 4 (2010): 345–49. http://dx.doi.org/10.7763/ijet.2010.v2.145.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Zhou, Xiaoyi, Jixin Ma, Wencai Du, and Yongzhe Zhao. "Ergodic Matrix and Hybrid-key Based Image Cryptosystem." International Journal of Image, Graphics and Signal Processing 3, no. 4 (2011): 1–9. http://dx.doi.org/10.5815/ijigsp.2011.04.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Begum, Mahbuba, Jannatul Ferdush, and Md Golam. "A Hybrid Cryptosystem using DNA, OTP and RSA." International Journal of Computer Applications 172, no. 8 (2017): 30–33. http://dx.doi.org/10.5120/ijca2017915198.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Reddicherla, Vikram Raju, Umashankar Rawat, Y. Jeevan Nagendra Kumar, and Atef Zaguia. "Secure Vertical Handover to NEMO Using Hybrid Cryptosystem." Security and Communication Networks 2021 (June 26, 2021): 1–12. http://dx.doi.org/10.1155/2021/6751423.

Full text
Abstract:
To provide security to all pairs of nodes in network mobility (NEMO) while executing the handoff between different technologies, a hybrid cryptosystem with a suitable network selection mechanism is proposed. All pairs of nodes, i.e., Mobile Node (MN), Mobile Router (MR), Correspondent Node (CN) and MN, and Home Agent (HA), respectively, are considered. A proper security mechanism is proposed to provide confidentiality to Bound Update (BU) during handoff and conversation between MN, MR, and HA using the elliptic curve cryptography (ECC). In this solution, a network selection mechanism is propos
APA, Harvard, Vancouver, ISO, and other styles
15

Takieldeen, Ali, Said H. Abd Elkhalik, Ahmed S. Samra, Mohamed A. Mohamed, and Fahmi Khalifa. "A Robust and Hybrid Cryptosystem for Identity Authentication." Information 12, no. 3 (2021): 104. http://dx.doi.org/10.3390/info12030104.

Full text
Abstract:
With the progressive development of a wide range of applications, interconnect things and internet of things (IoT) became an imperative required trend by industries and academicians. IoT became a base infrastructure for remote access or control depending on internet protocol (IP) networks, especially after the COVID-19 pandemic. The huge application domain’s infrastructure, which depends on IoT, requires a trusted connection to guarantee security and privacy while transferring data. This paper proposes a hybrid identity authentication pipeline that integrates three schemes, namely, an elliptic
APA, Harvard, Vancouver, ISO, and other styles
16

Masood, Fawad, Wadii Boulila, Jawad Ahmad, et al. "A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos." Remote Sensing 12, no. 11 (2020): 1893. http://dx.doi.org/10.3390/rs12111893.

Full text
Abstract:
Aerial photography involves capturing images from aircraft and other flying objects, including Unmanned Aerial Vehicles (UAV). Aerial images are used in many fields and can contain sensitive information that requires secure processing. We proposed an innovative new cryptosystem for the processing of aerial images utilizing a chaos-based private key block cipher method so that the images are secure even on untrusted cloud servers. The proposed cryptosystem is based on a hybrid technique combining the Mersenne Twister (MT), Deoxyribonucleic Acid (DNA), and Chaotic Dynamical Rossler System (MT-DN
APA, Harvard, Vancouver, ISO, and other styles
17

Haraty, Ramzi A., and Walid El Horr. "A hybrid cryptosystem based on WEP for 802.11 networks." Journal of Computational Methods in Sciences and Engineering 6, s2 (2007): S359—S377. http://dx.doi.org/10.3233/jcm-2006-6s213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Nagar, Abhishek, Karthik Nandakumar, and Anil K. Jain. "A hybrid biometric cryptosystem for securing fingerprint minutiae templates." Pattern Recognition Letters 31, no. 8 (2010): 733–41. http://dx.doi.org/10.1016/j.patrec.2009.07.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Sinha, Aloka. "Nonlinear optical cryptosystem resistant to standard and hybrid attacks." Optics and Lasers in Engineering 81 (June 2016): 79–86. http://dx.doi.org/10.1016/j.optlaseng.2016.01.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Mohammed, Nada Qasim, Qasim Mohammed Hussein, Ahmed M. Sana, and Layth A. Khalil. "A Hybrid Approach to Design Key Generator of Cryptosystem." Journal of Computational and Theoretical Nanoscience 16, no. 3 (2019): 971–77. http://dx.doi.org/10.1166/jctn.2019.7985.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Rahmadani, R., T. T. A. Putri, S. Sriadhi, R. D. Sari, and H. D. Hutahaean. "Data security system using hybrid cryptosystem RC4A-RSA algorithm." IOP Conference Series: Materials Science and Engineering 830 (May 19, 2020): 032008. http://dx.doi.org/10.1088/1757-899x/830/3/032008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Rachmawati, Dian, Amer Sharif, Jaysilen, and Mohammad Andri Budiman. "Hybrid Cryptosystem Using Tiny Encryption Algorithm and LUC Algorithm." IOP Conference Series: Materials Science and Engineering 300 (January 2018): 012042. http://dx.doi.org/10.1088/1757-899x/300/1/012042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Sudheer, G. "A Hybrid Image Cryptosystem Based On OMFLIP Permutation Cipher." Signal & Image Processing : An International Journal 3, no. 1 (2012): 67–74. http://dx.doi.org/10.5121/sipij.2012.3106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Gupta, Kamlesh, and Sanjay Silakari. "Novel Approach for fast Compressed Hybrid color image Cryptosystem." Advances in Engineering Software 49 (July 2012): 29–42. http://dx.doi.org/10.1016/j.advengsoft.2012.03.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Gafsi, Mohamed, Mohamed Ali Hajjaji, Jihene Malek, and Abdellatif Mtibaa. "Efficient Encryption System for Numerical Image Safe Transmission." Journal of Electrical and Computer Engineering 2020 (October 31, 2020): 1–12. http://dx.doi.org/10.1155/2020/8937676.

Full text
Abstract:
In this paper, we propose an efficient cryptosystem for digital image encryption and authentication. The cryptosystem is a hybrid scheme that uses symmetric and asymmetric approaches. The first one is used to encrypt the host image by utilizing a chaos-based key generator. The second one is used to encrypt the initial secret key and the owner’s signature that permit authentication. The algorithm is evaluated and validated by its application on several types of standard images and tools such as the statistical analysis, the key, and the performance analysis. The results indicate that the propos
APA, Harvard, Vancouver, ISO, and other styles
26

Hu, Zhenji, and Jiafeng Xie. "Novel Hybrid-Size Digit-Serial Systolic Multiplier over GF(2m)." Symmetry 10, no. 11 (2018): 540. http://dx.doi.org/10.3390/sym10110540.

Full text
Abstract:
Because of the efficient tradeoff in area–time complexities, digit-serial systolic multiplier over G F ( 2 m ) has gained substantial attention in the research community for possible application in current/emerging cryptosystems. In general, this type of multiplier is designed to be applicable to one certain field-size, which in fact determines the actual security level of the cryptosystem and thus limits the flexibility of the operation of cryptographic applications. Based on this consideration, in this paper, we propose a novel hybrid-size digit-serial systolic multiplier which not only offe
APA, Harvard, Vancouver, ISO, and other styles
27

Zajac, Pavol. "Hybrid Encryption from McEliece Cryptosystem with Pseudo-random Error Vector." Fundamenta Informaticae 169, no. 4 (2019): 345–60. http://dx.doi.org/10.3233/fi-2019-1851.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Poriye, Monika, and Shuchita Upadhyaya. "Hybrid Cryptosystem with DNA Based Key for Wireless Sensor Networks." International Journal of Wireless & Mobile Networks 8, no. 6 (2016): 19–26. http://dx.doi.org/10.5121/ijwmn.2016.8602.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Erdiansyah, U., MKM Nasution, and Sawaluddin. "Hybrid cryptosystem multi-power RSA with N=PmQ and VMPC." IOP Conference Series: Materials Science and Engineering 725 (January 21, 2020): 012129. http://dx.doi.org/10.1088/1757-899x/725/1/012129.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

PRABAKERAN, SARAVANAN, KUMAR R. HEMANTH, T. ARVIND, and NARAYANAN BHARATH. "HYBRID CRYPTOSYSTEM USING HOMOMORPHIC ENCRYPTION AND ELLIPTIC CURVE CRYPTOGRAPHY ALGORITHM." i-manager's Journal on Computer Science 7, no. 1 (2019): 1. http://dx.doi.org/10.26634/jcom.7.1.15667.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Wang, Kunshu, Xiangjun Wu, Hui Wang, Haibin Kan, and Jürgen Kurths. "New color image cryptosystem via SHA-512 and hybrid domain." Multimedia Tools and Applications 80, no. 12 (2021): 18875–99. http://dx.doi.org/10.1007/s11042-021-10511-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Anindya Dwi Putri Islamidina, Amang Sudarsono, and Titon Dutono. "Secure Data Travelling User using Hybrid Cryptosystem with User Privacy Protection." EMITTER International Journal of Engineering Technology 8, no. 1 (2020): 102–25. http://dx.doi.org/10.24003/emitter.v8i1.486.

Full text
Abstract:
Nowadays traveling is the activity that everyone likes the most, but sometimes there is one traveling member who is lost and confused looking for the location of the other members. When traveling, they must bring a smartphone because of its small size and easy to carry anywhere. For this reason, an Android-based smartphone application that is able to send GPS data to all travelling members is proposed. In order to secure data transmission, cryptography and group signature to ensure that only traveling members could find out the location are applied. We use hybrid cryptography, which is a combi
APA, Harvard, Vancouver, ISO, and other styles
33

S, Kavitha, and P. J. A.Alphonse. "A Hybrid Cryptosystem to Enhance Security in IoT Health Care System." International Journal of Wireless and Microwave Technologies 9, no. 1 (2019): 1–10. http://dx.doi.org/10.5815/ijwmt.2019.01.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Rachmawati, Dian, Maya Silvi Lydia, and Wynda Arianni Siregar. "Hybrid Cryptosystem Implementation Using IDEA and Knapsack Algorithm for Message Security." Journal of Physics: Conference Series 1090 (September 2018): 012030. http://dx.doi.org/10.1088/1742-6596/1090/1/012030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Sulaiman, Oris Krianto. "HYBRID CRYPTOSYSTEM MENGGUNAKAN XOR CIPHER DAN MERKLE–HELLMAN KNAPSACK UNTUK MENJAGA KERAHASIAAN PESAN DIGITAL." JURNAL TEKNOLOGI INFORMASI 3, no. 2 (2019): 169. http://dx.doi.org/10.36294/jurti.v3i2.1072.

Full text
Abstract:
Abstrak - The acceleration of data communication in the world of information technology is developing very fast, more than millions of digital messages are exchanging every day in cyberspace. These digital messages are freely communicating on internet networks or public networks that result in anyone being able to access these digital messages. Because the openness of the internet network that involves many people can take digital messages, the protection for the messages should be good. Digital message protection is used so that digital messages are directed to their intended destination, for
APA, Harvard, Vancouver, ISO, and other styles
36

Rakheja, Pankaj, Rekha Vig, and Phool Singh. "An asymmetric hybrid cryptosystem using hyperchaotic system and random decomposition in hybrid multi resolution wavelet domain." Multimedia Tools and Applications 78, no. 15 (2019): 20809–34. http://dx.doi.org/10.1007/s11042-019-7406-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Park, ByeongGyu, Suhri Kim, Seokhie Hong, HeeSeok Kim, and Seog Chung Seo. "Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages." Applied Sciences 10, no. 5 (2020): 1831. http://dx.doi.org/10.3390/app10051831.

Full text
Abstract:
Beginning with the proposal of the McEliece cryptosystem in 1978, code-based cryptography has positioned itself as one of main categories in post-quantum cryptography (PQC). To date, the algebraic security of certain variants of McEliece cryptosystems has been challenged many times, although some of the variants have remained secure. However, recent studies on code-based cryptography have focused on the side-channel resistance since previous studies have indicated that the existing algorithms were vulnerable to side-channel analysis. In this paper, we propose the first side-channel attack on t
APA, Harvard, Vancouver, ISO, and other styles
38

Koppu, Srinivas, and V. Madhu Viswanatham. "A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform." Modelling and Simulation in Engineering 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/7470204.

Full text
Abstract:
An enhanced secure image chaotic cryptosystem has been proposed based on hybrid CMT-Lanczos algorithm. We have achieved fast encryption and decryption along with privacy of images. The pseudorandom generator has been used along with Lanczos algorithm to generate root characteristics and eigenvectors. Using hybrid CMT image, pixels are shuffled to accomplish excellent randomness. Compared with existing methods, the proposed method had more robustness to various attacks: brute-force attack, known cipher plaintext, chosen-plaintext, security key space, key sensitivity, correlation analysis and in
APA, Harvard, Vancouver, ISO, and other styles
39

Kaipa. "A HYBRID CRYPTOSYSTEM USING VARIABLE LENGTH SUB KEY GROUPS AND BYTE SUBSTITUTION." Journal of Computer Science 10, no. 2 (2014): 251–54. http://dx.doi.org/10.3844/jcssp.2014.251.254.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Gore, Aakash, S. S., and Preetesh Purohit. "Hybrid Cryptosystem using Modified Blowfish Algorithm and SHA Algorithm on Public Cloud." International Journal of Computer Applications 155, no. 3 (2016): 6–10. http://dx.doi.org/10.5120/ijca2016912275.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Mantoro, Teddy, and Andri Zakariya. "Securing E-Mail Communication Using Hybrid Cryptosystem on Android-based Mobile Devices." TELKOMNIKA (Telecommunication Computing Electronics and Control) 10, no. 4 (2012): 807. http://dx.doi.org/10.12928/telkomnika.v10i4.870.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Chang, Yi C., Hsuan T. Chang, and Chung J. Kuo. "Hybrid image cryptosystem based on dyadic phase displacement in the frequency domain." Optics Communications 236, no. 4-6 (2004): 245–57. http://dx.doi.org/10.1016/j.optcom.2004.03.037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Hardi, S. M., J. T. Tarigan, and N. Safrina. "Hybrid cryptosystem for image file using elgamal and double playfair cipher algorithm." Journal of Physics: Conference Series 978 (March 2018): 012068. http://dx.doi.org/10.1088/1742-6596/978/1/012068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Timilsina, Suresh, and Sarmila Gautam. "Analysis of Hybrid Cryptosystem Developed Using Blowfish and ECC with Different Key Size." Technical Journal 1, no. 1 (2019): 10–15. http://dx.doi.org/10.3126/tj.v1i1.27582.

Full text
Abstract:
Hybridization is always done in search of better system which may not be always achieved. But most of the time hybridization has proved to produce a system with advantages of the algorithms used in developing that hybrid system. Even if the system doesn’t have performance enhancement it will act as multi-layer security. Here, combing of Blowfish algorithm along with ECC algorithm is performed. After hybridization their performance analysis is done based on five different parameters with different key size of Blowfish algorithm i.e. 32 bit, 128 bit, 192 bit, 256 bit, 448 bit. Among these differ
APA, Harvard, Vancouver, ISO, and other styles
45

Sheela, S. J., K. V. Suresh, and Deepaknath Tandur. "A Novel Audio Cryptosystem Using Chaotic Maps and DNA Encoding." Journal of Computer Networks and Communications 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/2721910.

Full text
Abstract:
Chaotic maps have good potential in security applications due to their inherent characteristics relevant to cryptography. This paper introduces a new audio cryptosystem based on chaotic maps, hybrid chaotic shift transform (HCST), and deoxyribonucleic acid (DNA) encoding rules. The scheme uses chaotic maps such as two-dimensional modified Henon map (2D-MHM) and standard map. The 2D-MHM which has sophisticated chaotic behavior for an extensive range of control parameters is used to perform HCST. DNA encoding technology is used as an auxiliary tool which enhances the security of the cryptosystem
APA, Harvard, Vancouver, ISO, and other styles
46

latif, Israa H., and Ergun Erçelebi. "Implementation of Hybrid Cryptosystem using AES-256 and SHA-2 256 by LabVIEW." IJARCCE 6, no. 1 (2017): 351–57. http://dx.doi.org/10.17148/ijarcce.2017.6169.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Wu, Chuhan, Jun Chang, Xiangxin Xu, and Yongjian Zhang. "Hybrid cryptosystem based on diffraction transfer function and phase-truncated Fourier transform encryption." Optics Communications 450 (November 2019): 87–96. http://dx.doi.org/10.1016/j.optcom.2019.05.053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Hemdan, Ayman M., Osama S. Faragallah, Osama Elshakankiry, and Ahmed Elmhalaway. "A fast hybrid image cryptosystem based on random generator and modified logistic map." Multimedia Tools and Applications 78, no. 12 (2018): 16177–93. http://dx.doi.org/10.1007/s11042-018-6948-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Ma, Lihong, and Weimin Jin. "Symmetric and asymmetric hybrid cryptosystem based on compressive sensing and computer generated holography." Optics Communications 407 (January 2018): 51–56. http://dx.doi.org/10.1016/j.optcom.2017.08.047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Sulaiman, Saniah, and Zurina Mohd Hanapi. "Extensive Analysis on Images Encryption using Hybrid Elliptic Curve Cryptosystem and Hill Cipher." Journal of Computer Science 17, no. 3 (2021): 221–30. http://dx.doi.org/10.3844/jcssp.2021.221.230.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!