Results 281 to 290 of about 327,487 (331)

Encrypted PRNG by Logic Encryption

2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), 2020
In this paper, the authors consider such an area of information security as logical encryption. Logical encryption is one of the most important methods of hardware protection, which introduces additional key inputs into a given combinational scheme to protect functionality from unauthorized use.
Marina A. Kiryakina   +2 more
openaire   +1 more source

Image encryption: Generating visually meaningful encrypted images

Information Sciences, 2015
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Long Bao, Yicong Zhou
openaire   +2 more sources

Encryption

ACM SIGSAC Review, 1992
As we place more trust in our computer systems, we must continue to find more ways to make our systems deserving of that trust. Encryption is one of those ways.
openaire   +2 more sources

Public-Key Encryption

1999
Public-key algorithms use a secret element and a public element to their code. One of the main algorithms is RSA. Compared with DES it is relatively slow but it has the advantage that users can choose their own key whenever they need one. The most commonly used public-key cryptosystems are covered in the next sections.
openaire   +1 more source

Biometric encryption

Biometric Technology Today, 2007
Ann Cavoukian, Alex Stoianov
openaire   +1 more source

Symmetric Encryption

2009
Michael Coles, Rodney Landrum
openaire   +2 more sources

Home - About - Disclaimer - Privacy