Search
Search Results
-
Blockchain-Based Fair Payment for ABE with Outsourced Decryption
Attribute-based encryption (ABE) is an advanced public-key encryption supporting fine-grained access control and flexible sharing of encrypted data....
-
A reconfigurable and compact subpipelined architecture for AES encryption and decryption
AES has been used in many applications to provide the data confidentiality. A new 32-bit reconfigurable and compact architecture for AES encryption...
-
A two-layer networks-based audio encryption/decryption scheme via fixed-time cluster synchronization
In this paper, an audio encryption/decryption scheme based on the cluster synchronization of two-layer complex networks within fixed-time is...
-
Encryption/Decryption with Optical Transform
In this chapter, the methods of image encryption and decryption based on optical transformation are introduced. The extended fractional Fourier... -
Color Image Encryption and Decryption by Using Optical Scanning Cryptography Method
In this paper, a computer simulation of optical encryption for color images are presented based on the optical scanning cryptography technique that... -
Secure and efficient multi-key FHE scheme supporting multi-bit messages from LWE preserving non-interactive decryption
We consider multi-key fully homomorphic encryption (multi-key FHE) which is the richest variant of fully homomorphic encryption (FHE) that allows...
-
A New Algorithm for Encryption and Decryption Using AUM Block Sum Labeling
The advantages of digital data are spreading throughout all industries in the modern world, and securing data while exchanging is extremely... -
All-Optical Encryption and Decryption Circuit
In modern times, there is a huge demand for high speed communication and optical circuits can serve us the purpose very well. There have been many... -
RL-BLED: A Reversible Logic Design of Bit Level Encryption/Decryption Algorithm for Secure Mammogram Data Transmission
Security is an essential task while focusing on confidential level of patient information during medical data transmission. The image encryption...
-
An Advanced Encryption Standard in Memory (AESIM) Efficient, High Performance S-box Based AES Encryption and Decryption Architecture on VLSI
As CMOS(Complementary Metal Oxide Semiconductor) technology reaches its scaling threshold, evolving non-volatile memory approaches are becoming a...
-
FPGA hardware acceleration of an improved chaos-based cryptosystem for real-time image encryption and decryption
This paper introduces a full **linx FPGA-Zynq implementation of a robust cryptosystem for real-time image encryption and decryption. Firstly, a...
-
Need of Hour: Hybrid Encryption and Decryption Standards (HEaDS) Algorithm for Data Security
With the significant advancements in information technology, a massive amount of data is being shared over the internet. And over the previous few... -
Study on the Encryption and Decryption Capabilities of Hybrid Techniques for Images
Data plays an important role in modern life, and because more and more gadgets are connecting to the internet, the amount of data stored online is... -
Asymmetric DNA encryption and decryption technique for Arabic plaintext
The security of transmitting information from one point to another through different media is an important issue in the modern digital society....
-
Preventing Data Leakage by Trojans in Commercial and ASIC Applications Using TDM and DES Encryption and Decryption
The purpose of this work is to provide a justification to the notion of reducing the leakage of data by the data leakage Trojans in the modulation... -
Transmission and Decryption of the Audio Signal Masked with ECG by FDM Method
Today, the use of these methods as hybrids has provided the motivation to be a solution to important problems, since the existing methods are...
-
Design of Heterogeneous Database Encryption and Decryption System Based on Data Mining
The main idea behind this method is to build a model to describe the relationship between encrypted data and plaintext data, as well as the... -
A Partial Outsourcing Decryption of Attribute-Based Encryption for Internet of Things
Internet of things (IoT) is a fast-growing technology in the modern digital era that attracts people from industries as well as academic fields. IoT... -
CryptoDataMR: Enhancing the Data Protection Using Cryptographic Hash and Encryption/Decryption Through MapReduce Programming Model
Cloud computing has become the most significant technology in today’s world as it provides several services including physical resources and... -
Encryption and Decryption of Secure Data for Diverse Genomes
In all respects, information management is the most important challenge in the present situation, since “DATA IS THE NEXT FUEL”. Data preservation is...