• No results found

Encryption Decryption

Multi-Round SR2C Encryption & Decryption

Multi-Round SR2C Encryption & Decryption

... In order to safe guard sensitive information, extra layers are added to encrypt and decrypt information. Once the user enters say marks, these marks are collected and forwarded to encryption/decryption ...

9

A robust and efficient scheme for image
encryption-decryption

A robust and efficient scheme for image encryption-decryption

... of encryption-decryption ...image encryption-decryption algorithms is quantified and compared using the resemblance of input image to the restored image, quantified by ...image ...

5

LIGHTWEIGHT ENCRYPTION- DECRYPTION TECHNIQUE

LIGHTWEIGHT ENCRYPTION- DECRYPTION TECHNIQUE

... Cryptography is the art and science of protecting information from undesirable individuals by converting it into a form non-recognizable by its attackers while stored and transmitted [1]. Security is very crucial part to ...

10

A New Polybit Shuffling Encryption and Decryption Algorithm Based on N Dimensional Encryption-Decryption Matrix

A New Polybit Shuffling Encryption and Decryption Algorithm Based on N Dimensional Encryption-Decryption Matrix

... the encryption-decryption matrix has dimension of 4 x 4 x 4 x ...The encryption matrix consists of the chunk of 8 bit or 1 byte length therefore is capable to contain the values 00H to ...the ...

7

Shared Architecture for Encryption/Decryption of AES

Shared Architecture for Encryption/Decryption of AES

... An encryption algorithm provides Confidentiality, Authentication, Integrity and Non- repudiation ...in encryption it is adhering to some set of ...for Encryption/Decryption modules to provide ...

6

Contributory Broadcast Encryption on Group key Agreement For key Distribution Encryption & Decryption

Contributory Broadcast Encryption on Group key Agreement For key Distribution Encryption & Decryption

... The CBE is a primitive which bridges the GKA and BE notions. In CBE, anyone can send secret messages to any subset of the group members, plus ye organization does not involve a trusted key server. Neither the vicissitude ...

6

A Review on Different Cryptographic Encryption Decryption Algorithm
                 

A Review on Different Cryptographic Encryption Decryption Algorithm  

... organization. Encryption is the technique that covers all these aspects and is a process of converting plaintext to cipher ...it encryption process involves a ...Public-key encryption the RSA ...

5

Survey Paper on Attribute Based Encryption & Decryption

Survey Paper on Attribute Based Encryption & Decryption

... well-performed encryption standard is required in which security operations do not bother other ...data decryption is required each time even for a small ...homorphic encryption some mathematical ...

7

FPGA Implementation of Modified AES Algorithm for Improved Timing

FPGA Implementation of Modified AES Algorithm for Improved Timing

... from Encryption and Decryption Module, another main component is Key Expansion ...AES Encryption / Decryption Standard mainly depends on this ...

7

A Research Paper on Data Encryption and Decryption

A Research Paper on Data Encryption and Decryption

... Kundankumar Rameshwar Saraf et. al. [18] wrote a paper “Text and Image Encryption Decryption Using Advanced Encryption Standard”. In this paper they described that images have large data size and ...

6

A Novel Video Encryption and Decryption Scheme based on Discrete Wavelet Transform and Fractional Fourier Transform

A Novel Video Encryption and Decryption Scheme based on Discrete Wavelet Transform and Fractional Fourier Transform

... image encryption-decryption methods have been proposed in recent past [1] - ...Video encryption-decryption algorithms are also of growing interest because of their importance in surveillance ...

6

Design and Implementation of Image encryption and decryption using Advanced Encryption Standard Algorithm

Design and Implementation of Image encryption and decryption using Advanced Encryption Standard Algorithm

... The decryption unit also uses same design approach for the entire architecture to decrypt the given cipher back to original ...of Decryption module is same as encryption module with all complimentary ...

7

Cloud Data Security using Homomorphic Encryption

Cloud Data Security using Homomorphic Encryption

... file encryption, decryption, sharing and search of data on cryptographic ...for encryption and decryption ...data encryption therefore the entire data is first converted into a small ...

6

A. Advanced Encryption Standard (AES)

A. Advanced Encryption Standard (AES)

... Abstract- This paper presents a multi-layered architecture for the security of network and data using a layered structure of cryptographic algorithms. This architecture gives benefit of low area and high speed ...

9

A Compact Implementation of SM4 Encryption and Decryption Circuit

A Compact Implementation of SM4 Encryption and Decryption Circuit

... the encryption and decryption part to achieve the goal of reducing the area is proposed in ...of encryption and decryption operations and key schedule, so the hardware implementation ...

5

A Novel Key Distribution Scheme for Efficient Group Communication in MANET

A Novel Key Distribution Scheme for Efficient Group Communication in MANET

... key encryption to protect communication group by using a novel key approach, its implementation affability without relying on a fully trusted authority provide our protocol a very promising solution to many ...

6

Digital Watermarking Encryption and Decryption Using DWT

Digital Watermarking Encryption and Decryption Using DWT

... appear visible to a casual viewer on careful inspection. Primary images are embedded with the invisible fragile watermark technique in such a way that modification or manipulation of the image would destroy or alter the ...

6

Encryption and Decryption without any Cryptographic Algorithm

Encryption and Decryption without any Cryptographic Algorithm

... new encryption scheme namely A Medium Field Multivariate Public-key encryption Scheme (MFE) belonging to MQ and provided a performance and security ...public-key encryption was efficient because only ...

8

Using Circle Map for Audio Encryption Algorithm

Using Circle Map for Audio Encryption Algorithm

... New model of audio encryption is presented in this paper. The audio encryption algorithm is modeled by using preudorandom bit generator based on two circle maps. The proposed method permutates data in ...

7

Data Security in Cloud Computing Using Cryptographic Algorithms: A Review

Data Security in Cloud Computing Using Cryptographic Algorithms: A Review

... Data Cryptography is a method of protecting information and communication using codes so that only those for whom the information is intended can read and process it. The prefix “Crypt” means “hidden” and the suffix ...

6

Show all 3779 documents...

Related subjects