ENCRYPTION/DECRYPTION

作品数:7被引量:7H指数:1
导出分析报告
相关领域:电子电信更多>>
相关期刊:《International Journal of Communications, Network and System Sciences》《Journal of Information Security》《International Journal of Extreme Manufacturing》《Journal of Harbin Institute of Technology(New Series)》更多>>
相关基金:国家自然科学基金天津市自然科学基金更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-7
视图:
排序:
Algorithms and Tools for Securing and Protecting Academic Data in the Democratic Republic of the Congo
《Journal of Information Security》2022年第4期312-322,共11页Gulain Mugaruka Buduge Jérémie Ndikumagenge Justin Buhendwa Nyenyezi 
This paper deals with the implementation of algorithms and tools for the security of academic data protection in the Democratic Republic of the Congo. It consists principally in implementing two algorithms and two dis...
关键词:COMPUTER SECURITY Crypto Systems and Analysis ALGORITHMS ENCRYPTION/DECRYPTION 
Encryption/decryption and microtarget capturing by pH-driven Janus microstructures fabricated by the same femtosecond laser printing parameters被引量:6
《International Journal of Extreme Manufacturing》2021年第2期89-97,共9页Zhaoxin Lao Rui Sun Dongdong Jin Zhongguo Ren Chen Xin Yachao Zhang Shaojun Jiang Yiyuan Zhang Li Zhang 
the Hong Kong Scholar Program (XJ2018035) for their financial support;supported by Research Grants Council of Hong Kong (No. JLFS/E-402/18);National Natural Science Foundation of China (No. 51805509)。
Several natural organism can change shape under external stimuli. These natural phenomena have inspired a vast amount of research on exploration and implementation of reconfigurable shape transformation. The Janus str...
关键词:micro actuator smart material pH hydrogel Janus structure laser printing 
Cryptographic Schemes Based on Elliptic Curves over the Ring Zp[i]
《Applied Mathematics》2016年第3期304-312,共9页Manoj Kumar Pratik Gupta 
Elliptic Curve Cryptography recently gained a lot of attention in industry. The principal attraction of ECC compared to RSA is that it offers equal security for a smaller key size. The present paper includes the study...
关键词:Elliptic Curve RING Finite Field ISOMORPHISM CARDINALITY ENCRYPTION/DECRYPTION 
Evolution of an Emerging Symmetric Quantum Cryptographic Algorithm
《Journal of Information Security》2015年第2期82-91,共10页Omer K. Jasim Safia Abbas El-Sayed M. Horbaty Abdel-Badeeh M. Salem 
With the rapid evolution of data exchange in network environments, information security has been the most important process for data storage and communication. In order to provide such information security, the confid...
关键词:AES ENCRYPTION/DECRYPTION QUANTUM COMPUTATIONS QKD SYMMETRIC Algorithm 
Double-Moduli Gaussian Encryption/Decryption with Primary Residues and Secret Controls被引量:1
《International Journal of Communications, Network and System Sciences》2011年第7期475-481,共7页Boris S. Verkhovsky 
In this paper an encryption-decryption algorithm based on two moduli is described: one in the real field of integers and another in the field of complex integers. Also the proper selection of cryptographic system para...
关键词:ambiguity-free INFORMATION recovery complex modulus CRYPTOSYSTEM design cycling identity INFORMATION hiding PLAINTEXT preconditioning PRIMARY residue public-key cryptography secret controls threshold parameters 
Enhanced Euclid Algorithm for Modular Multiplicative Inverse and Its Application in Cryptographic Protocols
《International Journal of Communications, Network and System Sciences》2010年第12期901-906,共6页Boris S. Verkhovsky 
Numerous cryptographic algorithms (ElGamal, Rabin, RSA, NTRU etc) require multiple computations of modulo multiplicative inverses. This paper describes and validates a new algorithm, called the Enhanced Euclid Algorit...
关键词:Extended-Euclid ALGORITHM MODULAR MULTIPLICATIVE INVERSE Public-Key Cryptography RSA Cryptocol Rabin Information Hiding ALGORITHM ELGAMAL ENCRYPTION/DECRYPTION NTRU Cryptosystem Computer Simulation Low Memory Devices 
Simple optical decryption based on a modified joint transform correlator technique
《Journal of Harbin Institute of Technology(New Series)》2006年第2期203-205,共3页王怀彬 王天佐 袁晓聪 
SponsoredbytheNationalNaturalScienceFoundationofChina(GrantNo.66272011);NaturalScienceFoundationofTianjin(GrantNo.033600211).
A new encryption/decryption system for optical information security is proposed in this paper. We used an iterative Fourier transform algorithm to optimize the encrypted hologram as well as the decryption key as phase...
关键词:computer generated holograms CORRELATOR ENCRYPTION/DECRYPTION 
检索报告 对象比较 聚类工具 使用帮助 返回顶部