نتایج جستجو برای: simultaneous encryption

تعداد نتایج: 143810  

Journal: :journal of artificial intelligence in electrical engineering 2014
shahin shafei

this paper mainly focused on implementation of aes encryption and decryption standard aes-128. all the transformations of both encryption and decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. this method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theaes inversesub bytes module and...

For many years, cryptanalysis has been considered as an attractive topic in jeopardizing the security and resistance of an encryption algorithm. The SDES encryption algorithm is a symmetric cryptography algorithm that performs a cryptographic operation using a crypt key. In the world of encryption, there are many search algorithms to cryptanalysis. In these researches, brute force attack algori...

2006
Jan Cappaert

Confidentiality and data authenticity are two basic concepts in security. The first guarantees secrecy of a message, while the latter protects its integrity. This paper examines the use of encryption to secure software static analysis and tampering attacks. We present the concept of code encryption, which offers confidentiality, and a method to create code dependencies that implicitly protect i...

Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...

2012
S. Lakshmana kiran P. Sunitha

Traditional fast Discrete Cosine Transforms (DCT)/ Inverse DCT (mCT) algorithms have focused on reducing the arithmetic complexity. In this manuscript, we implemented a new architecture simultaneous for image compression and encryption technique suitable for real-time applications. Here, contrary to traditional compression algorithms, only special points of DCT outputs are calculated. For the e...

Journal: :Journal of King Saud University - Computer and Information Sciences 2019

2014
N. F. Elabady M. I. Moussa H. M. Abdalkader S. F. Sabbeh

During the recent years several chaotic image encryption algorithms based on one dimensional (1-D) have been proposed, but the drawbacks of small key space, low speed, and low security in 1-D chaotic cryptosystems are obvious. This paper proposes a new image encryption technique based on 1-D and 2-D chaotic maps which provide more security and big key space. The 1-D chaotic system is induced fr...

Journal: :Optics express 2011
A Alfalou C Brosseau N Abdallah M Jridi

We report a new spectral multiple image fusion analysis based on the discrete cosine transform (DCT) and a specific spectral filtering method. In order to decrease the size of the multiplexed file, we suggest a procedure of compression which is based on an adapted spectral quantization. Each frequency is encoded with an optimized number of bits according its importance and its position in the D...

2017
Bahram Javidi Artur Carnicer Masahiro Yamaguchi Takanori Nomura Elisabet Pérez-Cabré María S Millán Naveen K. Nishchal R Torroba John Fredy Barrera Wenqi He Xiang Peng Adrian Stern Yair Rivenson A Alfalou C Brosseau Changliang Guo John T Sheridan Guohai Situ M Naruse T Matsumoto Ignasi Juvells Enrique Tajahuerce Jesús Lancis Wen Chen Xudong Chen Pepijn W H Pinkse Allard P Mosk Adam Markman

Information security and authentication are important challenges facing our society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and developments of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید