نتایج جستجو برای: decryption

تعداد نتایج: 3453  

Journal: :journal of artificial intelligence in electrical engineering 2014
shahin shafei

this paper mainly focused on implementation of aes encryption and decryption standard aes-128. all the transformations of both encryption and decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. this method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theaes inversesub bytes module and...

Journal: :Thrombosis Research 2012

Journal: :IACR Cryptology ePrint Archive 2007
Bo Qin Qianhong Wu Willy Susilo Yi Mu Yumin Wang

Anonymity is one of the main concerns in group-oriented cryptography. However, most efforts, for instance, group signatures and ring signatures, are only made to provide anonymity on the sender’s point of view. There is only few work done to ensure anonymity in a cryptographic sense on the recipient’s point of view in group-oriented communications. In this paper, we formalize the notion of grou...

Journal: :American Journal of Applied Sciences 2005

Journal: :Applied Mathematics Letters 2003

Journal: :International Journal of Computer Applications 2010

Journal: :Frontiers in Bioscience 2012

Journal: :IOP Conference Series: Materials Science and Engineering 2017

Journal: :CoRR 2009
Natasa Zivic

This paper analyzes performance aspects of Soft Input Decryption and L-values. Soft Input Decryption is a novel method which uses L-values (soft output) of a SISO channel decoder for the correction of input of Soft Input Decryption (SID blocks) which have been modified during the transmission over a noisy channel. The method is based on the combination of cryptography and channel coding improvi...

2008
NATASA ZIVIC CHRISTOPH RULAND

This paper develops further the idea of use of Soft Input Decryption. The function of Soft Input Decryption is to integrate decryption into the decoding process. In this paper it is shown how Soft Input Decryption can be enhanced using feedback from the channel decoder. In this way, the cooperation between channel coding and cryptography is further develops. The effect of the feedback is explai...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید