DECRYPTION

作品数:76被引量:69H指数:4
导出分析报告
相关领域:自动化与计算机技术更多>>
相关机构:杭州电子科技大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家高技术研究发展计划中国博士后科学基金The Royal Society更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 期刊=Journal of Information Securityx
条 记 录,以下是1-6
视图:
排序:
Learning with Errors Public Key Cryptosystem with Its Security
《Journal of Information Security》2023年第1期25-38,共14页Zhiyong Zheng Kun Tian Yi Zhang Yunfan Lu 
The main purpose of this paper is to introduce the LWE public key cryptosystem with its security. In the first section, we introduce the LWE public key cryptosystem by Regev with its applications and some previous res...
关键词:Learning With Errors Problem CRYPTOSYSTEM Decryption Error PROBABILITY SECURITY 
On the LWE Cryptosystem with More General Disturbance被引量:1
《Journal of Information Security》2022年第3期127-139,共13页Zhiyong Zheng Kun Tian 
The main purpose of this paper is to give an extension on learning with errors problem (LWE) based cryptosystem about the probability of decryption error with more general disturbance. In the first section, we introdu...
关键词:Learning with Errors Problem Decryption Error PROBABILITY General Disturbance 
Comparative Study of Different Cryptographic Algorithms被引量:1
《Journal of Information Security》2020年第3期138-148,共11页Baha Eldin Hamouda Hassan Hamouda 
With the increasing interconnection of computer networks and sophistication of cyber-attacks, Cryptography is one way to make sure that confidentiality, authentication, integrity, availability, and identification of d...
关键词:CRYPTOGRAPHY DES 3DES AES ENCRYPTION DECRYPTION CIPHERTEXT PLAINTEXT 
Design and Development of a Novel Symmetric Algorithm for Enhancing Data Security in Cloud Computing
《Journal of Information Security》2019年第4期199-236,共38页Mohammad Anwar Hossain Ahsan Ullah Newaz Ibrahim Khan Md Feroz Alam 
Cloud computing is a kind of computing that depends on shared figuring assets instead of having nearby servers or individual gadgets to deal with applications. Technology is moving to the cloud more and more. It’s no...
关键词:Data Security Cloud Computing Encryption DECRYPTION Secret Key SYMMETRIC ALGORITHM 192 BITS HASHING PERMUTATION SHA-512 
A Secure Image Steganography Using Advanced Encryption Standard and Discrete Cosine Transform
《Journal of Information Security》2019年第3期117-129,共13页Ashraful Tauhid Maisha Tasnim Saima Arifin Noor Nuruzzaman Faruqui Mohammad Abu Yousuf 
Cryptography and Steganography are two prominent techniques to obtain secure communication over the shared media like the Internet. Steganography is slightly ahead of cryptography because of its stealthy characteristi...
关键词:CRYPTOGRAPHY STEGANOGRAPHY SECURITY ENCRYPTION DECRYPTION 
Novel Hybrid Encryption Algorithm Based on Aes, RSA, and Twofish for Bluetooth Encryption
《Journal of Information Security》2018年第2期168-176,共9页Marwan Ali Albahar Olayemi Olawumi Keijo Haataja Pekka Toivanen 
In this paper, we proposed a novel triple algorithm based on RSA (Rivest-Shamir-Adleman), AES (Advanced Encryption Standard), and TwoFish in order to further improve the security of Bluetooth that is currently using o...
关键词:BLUETOOTH Security AES TWOFISH RSA ENCRYPTION DECRYPTION 
检索报告 对象比较 聚类工具 使用帮助 返回顶部