Índice
Literatura académica sobre el tema "INVERSION-ENCRYPTION METHOD"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "INVERSION-ENCRYPTION METHOD".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "INVERSION-ENCRYPTION METHOD"
Khan, Sajid, Lansheng Han, Ghulam Mudassir, Bachira Guehguih y Hidayat Ullah. "3C3R, an Image Encryption Algorithm Based on BBI, 2D-CA, and SM-DNA". Entropy 21, n.º 11 (2 de noviembre de 2019): 1075. http://dx.doi.org/10.3390/e21111075.
Texto completoCheng, Peng y Huai Xun Zhao. "A Novel Image Encryption Algorithm Based on Cellular Automata and Chaotic System". Advanced Materials Research 998-999 (julio de 2014): 797–801. http://dx.doi.org/10.4028/www.scientific.net/amr.998-999.797.
Texto completoLokesh Reddy, B. y Anith Nelleri. "Single-Pixel Compressive Digital Holographic Encryption System Based on Circular Harmonic Key and Parallel Phase Shifting Digital Holography". International Journal of Optics 2022 (14 de julio de 2022): 1–20. http://dx.doi.org/10.1155/2022/6298010.
Texto completoNaseer, Yasir, Tariq Shah, Dawood Shah y Sadam Hussain. "A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes". Cryptography 3, n.º 1 (16 de enero de 2019): 6. http://dx.doi.org/10.3390/cryptography3010006.
Texto completoLi, Jiakun y Wei Gao. "Hardware Optimization and System Design of Elliptic Curve Encryption Algorithm Based on FPGA". Journal of Sensors 2022 (11 de octubre de 2022): 1–12. http://dx.doi.org/10.1155/2022/9074524.
Texto completoZhang, Xing, Xiaoyu Jiang, Zhaolin Jiang y Heejung Byun. "Algorithms for solving a class of real quasi-symmetric Toeplitz linear systems and its applications". Electronic Research Archive 31, n.º 4 (2023): 1966–81. http://dx.doi.org/10.3934/era.2023101.
Texto completoRatan, Ram y Arvind Yadav. "Key Independent Image Deciphering using Neighbourhood Similarity Characteristics and Divide-And-Conquer Attack". Recent Patents on Engineering 14 (19 de julio de 2020). http://dx.doi.org/10.2174/1872212114999200719144548.
Texto completoLi, Zhenqiang, Fei Gao, Sujuan Qin y Qiaoyan Wen. "New record in the number of qubits for a quantum implementation of AES". Frontiers in Physics 11 (24 de marzo de 2023). http://dx.doi.org/10.3389/fphy.2023.1171753.
Texto completoAlaverdyan, Y. Ts y E. G. Satimova. "Fully Homomorphic Cipher Based on Finite Algebraic Structures". Earthline Journal of Mathematical Sciences, 18 de enero de 2019, 97–103. http://dx.doi.org/10.34198/ejms.1119.97103.
Texto completoTesis sobre el tema "INVERSION-ENCRYPTION METHOD"
RANI, VIJETA. "PSEUDORANDOM BINARY SEQUENCE GENERATION FOR STREAM CIPHERS". Thesis, 2012. http://dspace.dtu.ac.in:8080/jspui/handle/repository/13961.
Texto completoPseudorandom binary sequences find their application in diverse fields but security and cryptography is probably the best known field of their application. One-Time Pad (OTP) is a simple, fast and the most secure encryption algorithm. It provides the perfect secrecy. The encryptiondecryption process of the OTP is based on exclusive-or function computed on the plaintext/ciphertext and the key bits. The requirements for the OTP key are that: it must be a cryptographically strong truly random or pseudorandom binary sequence; must be as long as plaintext size; and must not be reused. The difference between a truly random and a pseudorandom sequence is that the truly random sequence is generated with the help of nondeterministic physical phenomenon but the pseudorandom sequence is generated from some deterministic mechanism and a seed value. In case of pseudorandom binary sequences, given the same seed the pseudorandom number generator will always output the same sequence of numbers or bits. The fundamental difficulty with a truly random sequence is its generation and distribution. Therefore pseudorandom sequences are a popular choice for the practical implementation of the OTP scheme. Many researchers have devoted their time and effort to the family of shift register based pseudorandom sequence generators. But they could not gain a key sequence having very large period equal to the plaintext length. They also tried the complex versions of shift registers but it is yet not very useful and secure