Academic literature on the topic 'Asymmetric encryption methods'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Asymmetric encryption methods.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Asymmetric encryption methods"
Luo, Guangchun, Ningduo Peng, Ke Qin, and Aiguo Chen. "A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods." Scientific World Journal 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/153791.
Full textAbdElminaam, DiaaSalama, Hatem M. Abdul Kader, Mohie M. Hadhoud, and Salah M. El-Sayed. "Developing and Evaluation of New Hybrid Encryption Algorithms." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 1 (March 28, 2014): 4038–52. http://dx.doi.org/10.24297/ijct.v13i1.2926.
Full textYayla, Rıdvan, Hakan Üçgün, and Sefa Tunçer. "A Research on Encryption Methods and Account Security." Academic Perspective Procedia 3, no. 1 (October 25, 2020): 385–94. http://dx.doi.org/10.33793/acperpro.03.01.81.
Full textNagavalli, S., and G. Ramachandran. "A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryption Scheme." International Journal of Advances in Applied Sciences 7, no. 4 (December 1, 2018): 369. http://dx.doi.org/10.11591/ijaas.v7.i4.pp369-376.
Full textSa'adah, Nihayatus, I. Gede Puja Astawa, and Amang Sudarsono. "Trusted Data Transmission Using Data Scrambling Security Method with Asymmetric Key Algorithm for Synchronization." EMITTER International Journal of Engineering Technology 6, no. 2 (December 29, 2018): 217–35. http://dx.doi.org/10.24003/emitter.v6i2.267.
Full textHOOBI, Mays M. "SURVEY: EFFICIENT HYBRID ALGOR ITHMS OF CRYPTOGRAPHY." MINAR International Journal of Applied Sciences and Technology 2, no. 4 (December 1, 2020): 1–16. http://dx.doi.org/10.47832/2717-8234.4-2.1.
Full textManiyath, Shima Ramesh, and Thanikaiselvan V. "A novel efficient multiple encryption algorithm for real time images." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 2 (April 1, 2020): 1327. http://dx.doi.org/10.11591/ijece.v10i2.pp1327-1336.
Full textZhu, Maoran, and Xin Liu. "Study on Internet Finance Credit Information Sharing Based on Block Chain Technology." Asian Social Science 14, no. 2 (January 29, 2018): 81. http://dx.doi.org/10.5539/ass.v14n2p81.
Full textSafira, Maria Okta, and I. Komang Ari Mogi. "Design Of Hybrid Cryptography With Vigenere Cipher And RSA Algorithm On IOT Data Security." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 8, no. 4 (February 4, 2020): 475. http://dx.doi.org/10.24843/jlk.2020.v08.i04.p14.
Full textKotukh, E. V., O. V. Severinov, A. V. Vlasov, L. S. Kozina, A. O. Tenytska, and E. O. Zarudna. "Methods of construction and properties of logariphmic signatures." Radiotekhnika, no. 205 (July 2, 2021): 94–99. http://dx.doi.org/10.30837/rt.2021.2.205.09.
Full textDissertations / Theses on the topic "Asymmetric encryption methods"
Квітка, Олександр Вячеславович. "Алгоритмічно-програмний метод асиметричного шифрування даних." Master's thesis, КПІ ім. Ігоря Сікорського, 2021. https://ela.kpi.ua/handle/123456789/46637.
Full textThis master's dissertation is devoted to the development and implementation of the method of asymmetric data encryption. The dissertation analyzes the existing methods of asymmetric encryption, defines the requirements for the developed method, substantiates the most appropriate asymmetric encryption method RSA and based on it developed the asymmetric encryption method. This method differs from the existing ones by using a compound module consisting of prime numbers, the number of which is approximately equal to "1" /"25" of the length of the module, combined with the consequence of the Chinese Remainder theorem, which reduces computational complexity exponentially proportional to increase the length of the encryption module. The practical value of the results obtained in this work is that the proposed method of asymmetric encryption has reduced computational complexity compared to existing methods for module lengths over 10 thousand bits. In this master's dissertation a software module of encryption based on the proposed modified method and software for studying the computational complexity of encryption methods have been developed.
Book chapters on the topic "Asymmetric encryption methods"
Tharakan, Linoy A., Sherly Daniel, and R. Dhanasekaran. "Security Enhancement and Monitoring for Data Sensing Networks Using a Novel Asymmetric Mirror-Key Data Encryption Method." In Studies in Big Data, 65–78. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-4412-9_3.
Full textJayapandian N. "Threats and Security Issues in Smart City Devices." In Secure Cyber-Physical Systems for Smart Cities, 220–50. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7189-6.ch009.
Full textJayapandian N. "Threats and Security Issues in Smart City Devices." In Research Anthology on Artificial Intelligence Applications in Security, 1230–51. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch055.
Full textJayapandian N. "Threats and Security Issues in Smart City Devices." In Research Anthology on Artificial Intelligence Applications in Security, 1230–51. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch055.
Full textAl-Hamdani, Wasim A. "E-Mail, Web Service and Cryptography." In Applied Cryptography for Cyber Security and Defense, 52–78. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61520-783-1.ch003.
Full textChander, Bhanu. "The State-of-the-Art Cryptography Techniques for Secure Data Transmission." In Handbook of Research on Intrusion Detection Systems, 284–305. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2242-4.ch014.
Full textWilson, Robin. "6. From cards to cryptography." In Number Theory: A Very Short Introduction, 97–111. Oxford University Press, 2020. http://dx.doi.org/10.1093/actrade/9780198798095.003.0006.
Full textHe, Fan, Zhengquan Ang, Guanglun Yang, Qingqin Fu, Ling Yi, Pingjiang Xu, Jia Liu, Zhaoqing Liang, Changsheng Niu, and Jianying Chen. "A Master Station and Terminal Data Exchange Method Based on Symmetric and Asymmetric Algorithms." In Proceedings of CECNet 2021. IOS Press, 2021. http://dx.doi.org/10.3233/faia210426.
Full textPramanik, Sabyasachi, Ramkrishna Ghosh, Mangesh M. Ghonge, Vipul Narayan, Mudita Sinha, Digvijay Pandey, and Debabrata Samanta. "A Novel Approach Using Steganography and Cryptography in Business Intelligence." In Advances in Business Information Systems and Analytics, 192–217. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5781-5.ch010.
Full textHelal Ahmed, Md, Jagmohan Tanti, and Sumant Pushp. "A Public Key Cryptosystem Using Cyclotomic Matrices." In Coding Theory - Recent Advances, New Perspectives and Applications [Working Title]. IntechOpen, 2021. http://dx.doi.org/10.5772/intechopen.101105.
Full textConference papers on the topic "Asymmetric encryption methods"
Damasceno, Kayque, Carlos Cruz, Anderson De Oliveira, and Luís De Castro. "Alternative N-bit Key Data Encryption for Block Ciphers." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação, 2019. http://dx.doi.org/10.5753/sbseg.2019.13990.
Full textKrishna Rao, Akula Vamsi, V. N. Aditya Datta Chivukula, Sri Keshava Reddy Adupala, and Abhiram Reddy Cholleti. "Multi-Layer Encryption Algorithm." In 7th International Conference on VLSI and Applications (VLSIA 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.112103.
Full textBabenko, M., E. Shiriaev, A. Tchernykh, and E. Golimblevskaia. "Neural network method for base extension in residue number system." In The International Workshop on Information, Computation, and Control Systems for Distributed Environments. Crossref, 2020. http://dx.doi.org/10.47350/iccs-de.2020.01.
Full textGil, Sang-Keun, Seok-Hee Jeon, Jong-Rae Jung, and Nam Kim. "Asymmetric public key cryptosystem using digital holographic encryption method." In Practical Holography XXXIV: Displays, Materials, and Applications, edited by Hans I. Bjelkhagen. SPIE, 2020. http://dx.doi.org/10.1117/12.2548289.
Full textTan, Huashan, and Yang Yang. "A Software Protection Method Based On Computer Fingerprint And Asymmetric Encryption." In 2nd International Conference on Computer and Information Applications (ICCIA 2012). Paris, France: Atlantis Press, 2012. http://dx.doi.org/10.2991/iccia.2012.314.
Full textAmetepe, Adote Francois-Xavier, Semevo Arnaud R. M. Ahouandjinou, and Eugene C. Ezin. "Secure Encryption by Combining Asymmetric and Symmetric Cryptographic Method for Data Collection WSN in smart Agriculture." In 2019 IEEE International Smart Cities Conference (ISC2). IEEE, 2019. http://dx.doi.org/10.1109/isc246665.2019.9071658.
Full textShi, Zhangyue, Chenang Liu, Chen Kan, Wenmeng Tian, and Yang Chen. "A Blockchain-Enabled Approach for Online Stream Sensor Data Protection in Cyber-Physical Manufacturing Systems." In ASME 2021 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/detc2021-72023.
Full textZhang, Chenggong, Wenqi He, Zewei Cai, and Xiang Peng. "Generalized amplitude-phase retrieval algorithm attack on 'double images encryption method with resistance against the special attack based on an asymmetric algorithm'." In SPIE Optical Engineering + Applications, edited by Khan M. Iftekharuddin, Abdul A. S. Awwal, Mireya García Vázquez, Andrés Márquez, and Mohammad A. Matin. SPIE, 2016. http://dx.doi.org/10.1117/12.2236277.
Full text