Results 111 to 120 of about 93,492 (364)
A Simple, Accurate and Highly Secure Method to Encrypt-Decrypt Digital Images
The digital image may be important and has a secret character, which requires not understanding it when looking at the naked eye or not understanding the contents. So seeking a method of digital image encryption-decryption is a very important task.
Jamil Al-Azzeh, Ziad Alqadi, Qazem Jaber
doaj +1 more source
Synchrotron Radiation for Quantum Technology
Materials and interfaces underpin quantum technologies, with synchrotron and FEL methods key to understanding and optimizing them. Advances span superconducting and semiconducting qubits, 2D materials, and topological systems, where strain, defects, and interfaces govern performance.
Oliver Rader +10 more
wiley +1 more source
Execution Integrity with In-Place Encryption
Instruction set randomization (ISR) was initially proposed with the main goal of countering code-injection attacks. However, ISR seems to have lost its appeal since code-injection attacks became less attractive because protection mechanisms such as data ...
Arias, Orlando +5 more
core
The SERS spectra of reporter molecules adsorbed on chiral gold nanorods depends on the handedness of circularly polarized light (CPL‐SERS). The bisignate plasmonic CD spectra of chiral nanorods provides wavelength‐dependent CPL‐SERS. Selective discrimination of chiral nanorod handedness and different Raman reporters allow highly sensitive codification ...
Andrés Serrano‐Freijeiro +9 more
wiley +1 more source
For data security applications, the use of fluorescent inks has become the most promising approach because of their convenience and low cost. However, traditional fluorescent inks are usually visible either under ambient light or UV light, whereas the ...
Chun Sun +6 more
semanticscholar +1 more source
DES encryption and decryption algorithm implementation based on FPGA
Nowadays there is a lot of importance given to data security on the internet. The DES is one of the most preferred block cipher encryption/decryption procedures used at present. This paper presents a high throughput reconfigurable hardware implementation
Subhi R. M. Zeebaree
semanticscholar +1 more source
This study highlights the importance of accounting for stoichiometric hydrogen produced when utilizing Si photocatalysts. The stoichiometric contribution is sacrificial reagent dependent and decreases with increasing sterics around the catalyst surface.
Sarrah H. Putwa +4 more
wiley +1 more source
Stream cipher based on quasigroup string transformations in $Z_p^*$
In this paper we design a stream cipher that uses the algebraic structure of the multiplicative group $\bbbz_p^*$ (where p is a big prime number used in ElGamal algorithm), by defining a quasigroup of order $p-1$ and by doing quasigroup string ...
Gligoroski, Danilo
core +1 more source
A Hybrid Encryption and Decryption Algorithm using Caesar and Vigenere Cipher
Camille Merlin S. Tan +3 more
openalex +1 more source

