Search

Your search keyword '"Cryptosystem"' showing total 8,142 results

Search Constraints

Start Over You searched for: Descriptor "Cryptosystem" Remove constraint Descriptor: "Cryptosystem"
8,142 results on '"Cryptosystem"'

Search Results

1. Secure and efficient public auditing system of user data using hybrid AES-ECC crypto system with Merkle hash tree in blockchain.

2. Image encryption scheme based on symmetric multimodal skew tent map.

3. A Cognitive Comparative Analysis of Geometric Shape-Based Cryptosystem

4. A cryptographic method to have a secure communication of health care digital data into the cloud.

5. Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem.

6. Design and evaluation of novel hybrid quantum resistant cryptographic system for enhancing security in wireless body sensor networks.

7. Preservation of Sensitive Data Using Multi-Level Blockchain-based Secured Framework for Edge Network Devices.

8. Elliptic Curves over a Finite Ring.

9. New image encryption algorithm based on hyperchaotic 3D-IHAL and a hybrid cryptosystem.

10. Generalized Fibonacci Sequences for Elliptic Curve Cryptography.

11. A novel image protection cryptosystem with only permutation stage: multi-shuffling process.

13. Color Image Encryption Using Hybrid Three-Scroll Unified Chaotic Attractor and 6D Hyperchaotic System

15. A Post-quantum Cryptosystem with a Hybrid Quantum Random Number Generator

17. Hybrid Security for Data in Cloud Computing: A Review

18. Modified ElGamal Algorithm Using Three Paring Functions

19. Performance Analysis of Various Asymmetric Public-Key Cryptosystem

20. Stochastic Gradient Descent long short-term memory based secure encryption algorithm for cloud data storage and retrieval in cloud computing environment

21. A new multimedia cryptosystem using chaos, quaternion theory and modular arithmetic.

22. A Novel Internet of Medical Thing Cryptosystem Based on Jigsaw Transformation and Ikeda Chaotic Map.

23. Cryptanalysis of 2D-SCMCI Hyperchaotic Map Based Image Encryption Algorithm.

24. ON THE ARITHMETIC OF ENDOMORPHISM RING End(Zp² x Zp) AND ITS RSA VARIANTS.

25. A Novel 3-D Jerk System, Its Bifurcation Analysis, Electronic Circuit Design and a Cryptographic Application.

29. Secure Key-Based Substitution-Boxes Design Using Systematic Search for High Nonlinearity

30. Design of New Stegano-Cryptosystem Based Non-Hiding Principle

31. Stochastic Gradient Descent long short-term memory based secure encryption algorithm for cloud data storage and retrieval in cloud computing environment.

32. Software defined radio implementation of a secure waveform for real‐time data transmission using universal software radio peripheral.

33. Image Encryption Scheme Based on Orbital Shift Pixels Shuffling with ILM Chaotic System.

34. Security enhancement of the cloud paradigm using a novel optimized crypto mechanism.

35. Efficient Image Encryption Scheme Using Novel 1D Multiparametric Dynamical Tent Map and Parallel Computing.

37. Efficient Architecture for a High Performance Authenticated Encryption Algorithm on Reconfigurable Computing

38. A New Cryptosystem for Secured Data Communications in Plagiarism Checking Process Using Blockchain Technology.

39. Optical Correlators for Cryptosystems and Image Recognition: A Review.

40. Enriching Information Security via Hybrid of New Expand Rivest Shamir Adleman and Data Encryption Standard Cryptosystem.

41. Securing Data Transmission and Privacy Preserving Using Fully Homomorphic Encryption.

42. Generalized Fibonacci Sequences for Elliptic Curve Cryptography

43. Enriching Information Security via Hybrid of New Expand Rivest Shamir Adleman and Data Encryption Standard Cryptosystem

44. Design and implementation of a new lightweight chaos-based cryptosystem to secure IoT communications.

45. A TTP watermarking protocol based on visual cryptography.

46. Development of a New Chaotic Maps Cryptosystem with Quadratic Residue Problem.

47. Medical Image Cryptosystem using Dynamic Josephus Sequence and Chaotic-hash Scrambling.

48. Integrating Fresnelet Transform and Spiking Cortical Model for robust medical image cryptosystem in zero-watermarking.

49. Co-design based FPGA implementation of an efficient new speech hyperchaotic cryptosystem in the transform domain.

Catalog

Books, media, physical & digital resources