نتایج جستجو برای: simultaneous encryption
تعداد نتایج: 143810 فیلتر نتایج به سال:
In recent years, many multimedia and image encryption techniques based on chaotic maps have been proposed. In this paper, we propose a novel multimedia data encryption technique called MDEA (Multimedia Data Encryption Algorithm). Proposed encryption scheme is based on two digital chaotic maps, which in turn are used to generate two different chaotic sequences. Detail description of the proposed...
Speech encoding and encryption in VLSI, Published by ACM.Abstract In this paper, an image encryptiondecryption algorithm and its VLSI architecture are proposed. Fourier-Transform Based Speech Encryption.AbstractThis paper proposes a hardware-based speech. Public-key cryptography, the two keys are called the private key and. The VLSI implementation is.International journal of VLSI design Communi...
The notion of certified encryption had recently been suggested as a suitable setting for analyzing the security of encryption against adversaries that tamper with the key-registration process. The flexible syntax afforded by certified encryption suggests that identity-based and certificateless encryption schemes can be analyzed using the models for certified encryption. In this paper we explore...
Encryption is to rearrange the message into difference form so that the message is keep secret. The goal of encryption is to provide an easy and inexpensive means of encryption and decryption to all authorized users in possession of the appropriate key and difficult and expensive means to estimate the plain text without use of the key Nowadays the Internet becomes popular and encryption technol...
At present, security is significant for individuals and organizations. All information need to prevent theft, leakage, alteration. Security must be guaranteed by applying some or combining cryptography algorithms the information. Encipherment method that changes plaintext a secure form called cipherment. includes diverse types, such as symmetric asymmetric encipherment. This study proposes an i...
Encryption is often conceived as a committing process, in the sense that the ciphertext may serve as a commitment to the plaintext. But this does not follow from the standard definitions of secure encryption. We define and construct symmetric and asymmetric committing encryption schemes, enabling publicly verifiable non-repudiation. Committing encryption eliminates key-spoofing attacks and has ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید