Results 11 to 20 of about 39,375 (295)
Decryption of historical manuscripts: the DECRYPT project [PDF]
Many historians and linguists are working individually and in an uncoordinated fashion on the identification and decryption of historical ciphers. This is a time-consuming process as they often work without access to automatic methods and processes that can accelerate the decipherment.
Megyesi, B. +9 more
openaire +3 more sources
Serial encryption using the functions of real variable
Context. Using the functions of a real variable in cryptosystems as keys allow increasing their cryptographic strength since it is more difficult to select such keys. Therefore, the development of such systems is relevant. Objective.
Viktor Avramenko, Volodymyr Demianenko
doaj +1 more source
A new algorithm for biometric templates using a 6D-chaotic system, and 2D fractional discrete cosine transform (FrDCT) is proposed in this paper. In this technique, the $k$ biometric templates are represented into three groups.
Dhanesh Kumar +9 more
doaj +1 more source
A Novel RGB Image Obfuscation Technique Using Dynamically Generated All Order-4 Magic Squares
Plethora of image encryption schemes exist in literature based on the construct of magic square for realizing the purpose of image obfuscation. This magic square carries out the scrambling project of the encryption.
Mahmood Ul Hassan +5 more
doaj +1 more source
Exploring high‐safety but convenient encryption and decryption technologies to combat threats of information leakage is urgently needed but remains a great challenge.
Dong Li +9 more
semanticscholar +1 more source
Program for Simulation and Testing of Apply Cryptography of Advance Encryption Standard (AES) Algorithm with Rivest-Shamir-Adleman (RSA) Algorithm for Good Performance [PDF]
Nowadays, information security management systems are important parts of managing a system for better handling of the information security. In scenarios and situations where safety management is done by managing protection of malwares, it is important to
Santi Pattanavichai
doaj +1 more source
On the Image Encryption Algorithm Based on the Chaotic System, DNA Encoding, and Castle
Hundreds of image encryption algorithms have been developed for the security and integrity of images through the combination of DNA computing and chaotic maps.
Nadeem Iqbal +6 more
doaj +1 more source
Comparative Study of Database Security In Cloud Computing Using AES and DES Encryption Algorithms
Security is consider as one of the largest part important aspects in daily computing. The security is important in cloud computing especially for data save in cloud because it have sensitivity and import data as well many user can access to same data ...
Nora Abdullah Al-gohany +1 more
doaj +1 more source
Crypto Model of Real-Time Audio Streaming Across Paired Mobile Devices [PDF]
The progressive usage of the Internet of Things (IoT) and smartphone ubiquity is inducing attention, importance and interest in leveraging smartphones for deploying and running sophisticated mobile applications. Modern smartphones have good connectivity,
E. Ibam, O. Boyinbode, I. Ayelabowo
doaj +1 more source
A Fast Text-to-Image Encryption-Decryption Algorithm for Secure Network Communication
Data security is the science of protecting data in information technology, including authentication, data encryption, data decryption, data recovery, and user protection.
Noor Sattar Noor +3 more
semanticscholar +1 more source

