Results 331 to 340 of about 93,492 (364)
Some of the next articles are maybe not open access.
Mathematical optimization of decrypting algorithm for soft input decryption
2009 XXII International Symposium on Information, Communication and Automation Technologies, 2009In this work, the strategy for correction of bits using Soft Input Decryption is analyzed. Soft Input Decryption is used for correction of cryptographic check values, which are very fragile when they are transmitted over noisy channels: only one wrong bit at input of the decryptor causes about 50% of errors at output of the decryptor.
Natasa Zivic, Esad Kadusic, Mirko Skrbic
openaire +1 more source
A dynamic encryption-decryption scheme for replay attack detection in cyber-physical systems
at - Automatisierungstechnik, 2023Tongxiang Li +4 more
semanticscholar +1 more source
Decryptable Searchable Encryption
2007As such, public-key encryption with keyword search (a.k.a PEKS or searchable encryption) does not allow the recipient to decrypt keywords i.e. encryption is not invertible. This paper introduces searchable encryption schemes which enable decryption. An additional feature is that the decryption key and the trapdoor derivation key are totally independent,
Thomas Fuhr, Pascal Paillier
openaire +1 more source
A two-layer networks-based audio encryption/decryption scheme via fixed-time cluster synchronization
Soft Computing - A Fusion of Foundations, Methodologies and Applications, 2022Lili Zhou +4 more
semanticscholar +1 more source
2016 International Conference on Computing Communication Control and automation (ICCUBEA), 2016
Vivek Dabra, Inderveer Chana, Anju Bala
openaire +1 more source
Vivek Dabra, Inderveer Chana, Anju Bala
openaire +1 more source

