Results 11 to 20 of about 48,518 (327)
Analytical Study of Hybrid Techniques for Image Encryption and Decryption
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption ...
Chiranji Lal Chowdhary +5 more
doaj +1 more source
Proposal to Generate a Various Key from Image for Various Encryption Methods [PDF]
There are three basic encryption methods: hashing, symmetric cryptography, and asymmetric cryptography. Each of these encryption methods have their own uses, advantages, and disadvantages.
Shatha Habeeb, Eman Shakeer
doaj +1 more source
A Survey on Searchable Symmetric Encryption
Outsourcing data to the cloud has become prevalent, so Searchable Symmetric Encryption (SSE), one of the methods for protecting outsourced data, has arisen widespread interest. Moreover, many novel technologies and theories have emerged, especially for the attacks on SSE and privacy-preserving. But most surveys related to SSE concentrate on one aspect (
Feng Li 0041 +5 more
openaire +2 more sources
3D CUBE Algorithm for the Key Generation Method: Applying Deep Neural Network Learning-Based
Current encryption systems are run with a hybrid mode in which symmetric and asymmetric key methods are mixed. This hybrid mode is devised to employ the fast processing speed of the symmetric key while circumventing the difficulty of providing services ...
Jungha Jin, Keecheon Kim
doaj +1 more source
An improved NFC device authentication protocol.
Aimed at the security authentication problem between Near Field Communication (NFC) devices, this paper uses the technology of asymmetric encryption algorithm, symmetric encryption algorithm, hash function, timestamp and survival period to improve the ...
He-Jun Lu, Dui Liu
doaj +1 more source
Substring-Searchable Symmetric Encryption [PDF]
Abstract In this paper, we consider a setting where a client wants to outsource storage of a large amount of private data and then perform substring search queries on the data – given a data string s and a search string p, find all occurrences of p as a substring of s.
Melissa Chase, Emily Shen
openaire +1 more source
Symmetric and Asymmetric Encryption [PDF]
All cryptosystems currently m use are symmetrm m the sense that they require the transmitter and receiver to share, m secret, either the same pmce of reformation (key) or one of a paLr of related keys easdy computed from each other, the key is used m the encryption process to introduce uncertainty to an unauthorized receiver.
openaire +2 more sources
This research proposes an efficient hybridized approach for symmetrical encryption of image files in bitmap formats. Due to the heavy use of lightweight encryption in fields such as military and corporate workplaces, intruders try to intercept ...
Kanshi Avaneesh +3 more
doaj +1 more source
Key Assignment Schemes with Authenticated Encryption, revisited
A popular cryptographic option to implement Hierarchical Access Control in organizations is to combine a key assignment scheme with a symmetric encryption scheme.
Jeroen Pijnenburg, Bertram Poettering
doaj +1 more source
An Improved AES Cryptosystem Based Genetic Method on S-Box, With, 256 Key Sizes and 14-Rounds [PDF]
Cryptography methods are widely use in digital communication for secure data transaction. Cryptography methods have two categories symmetric and asymmetric. Both types of encrypting have their own importance and limitations.
Lilhore, U. K. (Umesh) +1 more
core +1 more source

