نتایج جستجو برای: encryption

تعداد نتایج: 27368  

2015

Speech encoding and encryption in VLSI, Published by ACM.Abstract In this paper, an image encryptiondecryption algorithm and its VLSI architecture are proposed. Fourier-Transform Based Speech Encryption.AbstractThis paper proposes a hardware-based speech. Public-key cryptography, the two keys are called the private key and. The VLSI implementation is.International journal of VLSI design Communi...

Journal: :Advances in Science, Technology and Engineering Systems Journal 2017

2009
Pooya Farshim Bogdan Warinschi

The notion of certified encryption had recently been suggested as a suitable setting for analyzing the security of encryption against adversaries that tamper with the key-registration process. The flexible syntax afforded by certified encryption suggests that identity-based and certificateless encryption schemes can be analyzed using the models for certified encryption. In this paper we explore...

2014
Kavita Chaudhary Shiv Saxena

Encryption is to rearrange the message into difference form so that the message is keep secret. The goal of encryption is to provide an easy and inexpensive means of encryption and decryption to all authorized users in possession of the appropriate key and difficult and expensive means to estimate the plain text without use of the key Nowadays the Internet becomes popular and encryption technol...

Journal: :Journal of the Korea Institute of Information Security and Cryptology 2013

Journal: :International Journal of Electrical and Computer Engineering 2023

At present, security is significant for individuals and organizations. All information need to prevent theft, leakage, alteration. Security must be guaranteed by applying some or combining cryptography algorithms the information. Encipherment method that changes plaintext a secure form called cipherment. includes diverse types, such as symmetric asymmetric encipherment. This study proposes an i...

Journal: :IACR Cryptology ePrint Archive 2003
Yitchak Gertner Amir Herzberg

Encryption is often conceived as a committing process, in the sense that the ciphertext may serve as a commitment to the plaintext. But this does not follow from the standard definitions of secure encryption. We define and construct symmetric and asymmetric committing encryption schemes, enabling publicly verifiable non-repudiation. Committing encryption eliminates key-spoofing attacks and has ...

Journal: :IACR Cryptology ePrint Archive 2017
Ela Berners-Lee

Proxy Re-Encryption (PRE) allows a ciphertext encrypted under Alice’s public key to be transformed to an encryption under Bob’s public key without revealing either the plaintext or the decryption keys. PRE schemes have clear applications to cryptographic access control by allowing outsourced data to be selectively shared to users via re-encryption to appropriate keys. One concern for this appli...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید