Search

Your search keyword '"RSA algorithm"' showing total 114 results

Search Constraints

Start Over You searched for: Descriptor "RSA algorithm" Remove constraint Descriptor: "RSA algorithm" Topic image encryption Remove constraint Topic: image encryption
114 results on '"RSA algorithm"'

Search Results

1. Fast Color Image Encryption Algorithm Based on DNA Coding and Multi-Chaotic Systems.

2. An efficient confidentiality scheme based on quadratic chaotic map and Fibonacci sequence.

3. A Biometric Key-Enhanced Multimedia Encryption Algorithm for Social Media Blockchain.

4. Large file encryption in a Reduced-Round Permutation-Based AES file management system.

5. A multiphase encryption scheme using RSA, modified RMAC and Chen's hyperchaotic map.

6. Chaotic System Image Encryption Algorithm Base RSA

7. Multiple colour image encryption using multiple parameter FrDCT, 3D Arnold transform and RSA.

8. Improved Vigenere Cipher-RSA-Based Medical Image Security Through Multiple Encryption Keys.

9. Image encryption based Laplace transformation.

10. Implementation of Quantum Image Encryption via Reversible Quantum Logic Gates Computing.

11. Enhancing Key Exchange Security: Leveraging RSA Protocol in Encryption Algorithm Based on Hyperchaotic System.

12. A lightweight hybrid cryptographic algorithm for WSN security using the Raspberry Pi as a node.

13. Robust multifunctional watermarking system based zero-watermarking and polar harmonic Fourier moments.

14. Fractal-Based Hybrid Cryptosystem: Enhancing Image Encryption with RSA, Homomorphic Encryption, and Chaotic Maps.

15. DEVELOPING A NEW ENCRYPTION ALGORITHM FOR IMAGES TRANSMITTED THROUGH WSN SYSTEMS.

16. A New Encryption Scheme Based on RSA Encryption Algorithm and Chen Chaotic System

17. Image Encryption Using RSA Algorithm

18. A Secure and High Capacity Image Steganography Approach Using Huffman Coding and RSA Encryption.

19. Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing.

20. Event-Triggered Impulsive Controller Design for Synchronization of Delayed Chaotic Neural Networks and Its Fractal Reconstruction: An Application to Image Encryption.

21. Secure framework for IoT technology based on RSA and DNA cryptography

22. Sophisticated yet Convenient Information Encryption/Decryption Based on Synergistically Time‐/Temperature‐Resolved Photonic Inks.

23. Design of digital image encryption based on elliptic curve cryptography (ECC) algorithm and Radix-64 conversion.

24. An Image Encryption Algorithm Based on Complex Network Scrambling and Multi-Directional Diffusion.

25. Secure framework for IoT technology based on RSA and DNA cryptography.

26. Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains.

27. Metaheuristic Lightweight Cryptography for Security Enhancement in Internet of Things.

28. Secure data transmission in a real-time network for a tele-training education system.

29. Application of Data Image Encryption Technology in Computer Network Information Security.

30. Medical Image Compression and Encryption Using Adaptive Arithmetic Coding, Quantization Technique and RSA in DWT Domain.

31. Research on Key Security Detection Method of Cross Domain Information Sharing Based on PKG Trust Gateway.

32. Evolvable Hardware-Based Data Security System Using Image Steganography Through Dynamic Partial Reconfiguration.

33. Color image encryption using RSA cryptosystem with a chaotic map in Hartley domain.

34. Hybrid Encryption Scheme for Hospital Financial Data Based on Noekeon Algorithm.

35. Mixed Hill Cipher methods with triple pass protocol methods.

36. High speed data encryption technique with optimized memory based RSA algorithm for communications.

37. Image watermarking scheme employing Gerchberg–Saxton algorithm and integer wavelet transform.

38. Multi prime numbers principle to expand implementation of CRT method on RSA algorithm.

39. Performance-enhancing of RSA public key via three-dimensional hyperchaotic system.

40. An Image Encryption Scheme Based on Lorenz Hyperchaotic System and RSA Algorithm.

41. Optimal Cryptography Scheme and Efficient Neutrosophic C-Means Clustering for Anomaly Detection in Cloud Environment.

42. Strong leakage-resilient encryption: enhancing data confidentiality by hiding partial ciphertext.

43. An improved anti-quantum MST3 public key encryption scheme for remote sensing images.

44. Visually Meaningful Image Encryption Scheme Based on DWT and Schur Decomposition.

45. A hybrid encryption scheme based on optical scanning cryptography and Fibonacci–Lucas transformation.

46. An Asymmetric Image Encryption Algorithm Based on a Fractional-Order Chaotic System and the RSA Public-Key Cryptosystem.

47. Scalable and robust cryptography approach using cloud computing.

48. A novel method for digital data encoding-decoding.

49. Medical Data Security for Healthcare Applications Using Hybrid Lightweight Encryption and Swarm Optimization Algorithm.

50. Key Generation Using Generalized Pell's Equation in Public Key Cryptography Based on the Prime Fake Modulus Principle to Image Encryption and Its Security Analysis.

Catalog

Books, media, physical & digital resources