نتایج جستجو برای: decryption
تعداد نتایج: 3453 فیلتر نتایج به سال:
this paper mainly focused on implementation of aes encryption and decryption standard aes-128. all the transformations of both encryption and decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. this method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theaes inversesub bytes module and...
Anonymity is one of the main concerns in group-oriented cryptography. However, most efforts, for instance, group signatures and ring signatures, are only made to provide anonymity on the sender’s point of view. There is only few work done to ensure anonymity in a cryptographic sense on the recipient’s point of view in group-oriented communications. In this paper, we formalize the notion of grou...
This paper analyzes performance aspects of Soft Input Decryption and L-values. Soft Input Decryption is a novel method which uses L-values (soft output) of a SISO channel decoder for the correction of input of Soft Input Decryption (SID blocks) which have been modified during the transmission over a noisy channel. The method is based on the combination of cryptography and channel coding improvi...
This paper develops further the idea of use of Soft Input Decryption. The function of Soft Input Decryption is to integrate decryption into the decoding process. In this paper it is shown how Soft Input Decryption can be enhanced using feedback from the channel decoder. In this way, the cooperation between channel coding and cryptography is further develops. The effect of the feedback is explai...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید