Results 11 to 20 of about 48,518 (327)

Analytical Study of Hybrid Techniques for Image Encryption and Decryption

open access: yesSensors, 2020
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption ...
Chiranji Lal Chowdhary   +5 more
doaj   +1 more source

Proposal to Generate a Various Key from Image for Various Encryption Methods [PDF]

open access: yesEngineering and Technology Journal, 2013
There are three basic encryption methods: hashing, symmetric cryptography, and asymmetric cryptography. Each of these encryption methods have their own uses, advantages, and disadvantages.
Shatha Habeeb, Eman Shakeer
doaj   +1 more source

A Survey on Searchable Symmetric Encryption

open access: yesACM Computing Surveys, 2023
Outsourcing data to the cloud has become prevalent, so Searchable Symmetric Encryption (SSE), one of the methods for protecting outsourced data, has arisen widespread interest. Moreover, many novel technologies and theories have emerged, especially for the attacks on SSE and privacy-preserving. But most surveys related to SSE concentrate on one aspect (
Feng Li 0041   +5 more
openaire   +2 more sources

3D CUBE Algorithm for the Key Generation Method: Applying Deep Neural Network Learning-Based

open access: yesIEEE Access, 2020
Current encryption systems are run with a hybrid mode in which symmetric and asymmetric key methods are mixed. This hybrid mode is devised to employ the fast processing speed of the symmetric key while circumventing the difficulty of providing services ...
Jungha Jin, Keecheon Kim
doaj   +1 more source

An improved NFC device authentication protocol.

open access: yesPLoS ONE, 2021
Aimed at the security authentication problem between Near Field Communication (NFC) devices, this paper uses the technology of asymmetric encryption algorithm, symmetric encryption algorithm, hash function, timestamp and survival period to improve the ...
He-Jun Lu, Dui Liu
doaj   +1 more source

Substring-Searchable Symmetric Encryption [PDF]

open access: yesProceedings on Privacy Enhancing Technologies, 2015
Abstract In this paper, we consider a setting where a client wants to outsource storage of a large amount of private data and then perform substring search queries on the data – given a data string s and a search string p, find all occurrences of p as a substring of s.
Melissa Chase, Emily Shen
openaire   +1 more source

Symmetric and Asymmetric Encryption [PDF]

open access: yesACM Computing Surveys, 1979
All cryptosystems currently m use are symmetrm m the sense that they require the transmitter and receiver to share, m secret, either the same pmce of reformation (key) or one of a paLr of related keys easdy computed from each other, the key is used m the encryption process to introduce uncertainty to an unauthorized receiver.
openaire   +2 more sources

Hybridized Cryptographic Encryption and Decryption Using Advanced Encryption Standard and Data Encryption Standard

open access: yesCybernetics and Information Technologies, 2023
This research proposes an efficient hybridized approach for symmetrical encryption of image files in bitmap formats. Due to the heavy use of lightweight encryption in fields such as military and corporate workplaces, intruders try to intercept ...
Kanshi Avaneesh   +3 more
doaj   +1 more source

Key Assignment Schemes with Authenticated Encryption, revisited

open access: yesIACR Transactions on Symmetric Cryptology, 2020
A popular cryptographic option to implement Hierarchical Access Control in organizations is to combine a key assignment scheme with a symmetric encryption scheme.
Jeroen Pijnenburg, Bertram Poettering
doaj   +1 more source

An Improved AES Cryptosystem Based Genetic Method on S-Box, With, 256 Key Sizes and 14-Rounds [PDF]

open access: yes, 2017
Cryptography methods are widely use in digital communication for secure data transaction. Cryptography methods have two categories symmetric and asymmetric. Both types of encrypting have their own importance and limitations.
Lilhore, U. K. (Umesh)   +1 more
core   +1 more source

Home - About - Disclaimer - Privacy