Добірка наукової літератури з теми "Decryption"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Decryption".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Decryption"
Partala, Juha. "Symmetric Blind Decryption with Perfect Secrecy." Journal of Computer Networks and Communications 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/6575907.
Повний текст джерелаZheng, Ting, and Zhi Zhong Zhang. "A Method Based on Hash Table to Implement the NAS Layer Decryption in LTE Big Data Platform." Applied Mechanics and Materials 716-717 (December 2014): 1430–33. http://dx.doi.org/10.4028/www.scientific.net/amm.716-717.1430.
Повний текст джерелаBrygilevych, Volodymyr, Nazar Pelypets, and Vasyl Rabyk. "Encryption of text messages using multilayer neural networks." Computational Problems of Electrical Engineering 10, no. 2 (December 2, 2020): 1–6. http://dx.doi.org/10.23939/jcpee2020.02.001.
Повний текст джерелаPopescu, Narcis I., Cristina Lupu, and Florea Lupu. "Calcium Ionophore-Induced Tissue Factor (TF) Decryption Induces TF Immobilization Into Lipid Rafts and Negative Regulation of TF Procoagulant Activity." Blood 116, no. 21 (November 19, 2010): 1131. http://dx.doi.org/10.1182/blood.v116.21.1131.1131.
Повний текст джерелаSafitri, Sukmawati Indah, Muhammad Khudzaifah, and Mohammad Nafie Jauhari. "Penyandian Pesan Hybrid dengan Myszkowski Cipher dan Rivest, Shamir, Adleman (RSA)." Jurnal Riset Mahasiswa Matematika 2, no. 6 (September 1, 2023): 214–20. http://dx.doi.org/10.18860/jrmm.v2i6.22017.
Повний текст джерелаPatil, Vedika, Sakshi Jain, and Yogita Shah. "Secure Cryptography by Using Hash Application." Journal of Cyber Security in Computer System 1, no. 1 (May 11, 2022): 18–24. http://dx.doi.org/10.46610/jcscs.2022.v01i01.002.
Повний текст джерелаIrwanto, Dola. "File Encryption and Decryption Using Algorithm Aes-128 Bit Based Website." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 2 (April 1, 2024): 670–77. http://dx.doi.org/10.57152/malcom.v4i2.1305.
Повний текст джерелаWadehra, Shivangi, Shivam Goel, and Nidhi Sengar. "AES Algorithm: Encryption and Decryption." International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (April 30, 2018): 1075–77. http://dx.doi.org/10.31142/ijtsrd11221.
Повний текст джерелаLiu, Bao Long, Hua Chen, and Yi Guo. "Encrypted XML Data Query Processing with Range Query." Applied Mechanics and Materials 65 (June 2011): 241–45. http://dx.doi.org/10.4028/www.scientific.net/amm.65.241.
Повний текст джерелаNovianti, Chofifah Alfin, Muhammad Khudzaifah, and Mohammad Nafie Jauhari. "Kriptografi Hibrida Cipher Block Chaining (CBC) dan Merkle-Hellman Knapsack untuk Pengamanan Pesan Teks." Jurnal Riset Mahasiswa Matematika 3, no. 1 (October 31, 2023): 10–25. http://dx.doi.org/10.18860/jrmm.v3i1.22292.
Повний текст джерелаДисертації з теми "Decryption"
Strand, Martin. "Verifiable Shuffled Decryption." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for matematiske fag, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-21427.
Повний текст джерелаBurman, Annie. "Gendering decryption - decrypting gender : The gender discourse of labour at Bletchley Park 1939-1945." Thesis, Uppsala universitet, Historiska institutionen, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-201046.
Повний текст джерелаTakagi, Tsuyoshi. "New public-key cryptosystems with fast decryption." Phd thesis, [S.l. : s.n.], 2001. http://deposit.ddb.de/cgi-bin/dokserv?idn=962729302.
Повний текст джерелаKäck, Emil. "TLS Decryption in passive monitoring system with server private key." Thesis, Umeå universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-184490.
Повний текст джерелаMerz, Doug, and Bruce Maples. "Encrypt/Decrypt COMSEC Unit for Space-based Command and Telemetry Applications." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/605565.
Повний текст джерелаThis paper describes the system-level architecture and design concept of a communications security (COMSEC) equipment intended for space-based low data rate (< 1 Mbps) command and telemetry applications. The COMSEC Unit is a stand-alone piece of equipment which provides decryption of uplink command and control information and encryption of downlink telemetry data. The system-level architecture is described followed by an overview of the digital design concepts and a discussion of applications. Finally, although specifically targeted for narrowband command and telemetry applications, this design approach is flexible enough to accommodate other algorithms of choice as well as operate in higher data rate applications.
Loban, H. "A VHDL Implemetation of the Advanced Encryption Standard." Thesis, NURE, MC&FPGA, 2019. https://mcfpga.nure.ua/conf/2019-mcfpga/10-35598-mcfpga-2019-014.
Повний текст джерелаGreinsmark, Carl. "Ransomware." Thesis, Högskolan Kristianstad, Fakulteten för naturvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-20695.
Повний текст джерелаSamuel, David. "RFID security in door locks." Thesis, Linköping University, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-12186.
Повний текст джерелаRadio frequency identification, RFID is a technology that is used in many fields including locks. The unlimited access to the reader and the transponder has resulted in severe security weaknesses and made it possible to apply different attacks. To classify door locks as secure they must at least fulfil two main criteria: the first is the use of a challenge-response authentication protocol and the second is to deploy sophisticated and secure algorithms.
MiFare classic and KeeLoq are two widely applied technologies that are still in use in many security critical applications and are considered to be secure but which have been broken by cryptanalysis and with modest efforts and cost.
How secure a certain solution is depends on how expensive it is to buy the equipment that can break the system and reveal the secret key and how secure a lock should be depends on the value of what it is protecting.
The dropping price of powerful computers and the availability of security related information on the web will lead to an increase of the number of attacks on different systems.
By the time this thesis is published those locks evaluated are not secure enough, to overcome the security shortage some improvements have to be made such as: the use of sophisticated algorithms, the use of longer key of at least 128-bit, the use of non-deterministic random number generators and the use of pure hardware solutions both in the receiver and the transmitter to reduce leakage.
Manteena, Rajender. "A VHDL Implemetation of the Advanced Encryption Standard-Rijndael Algorithm." Scholar Commons, 2004. https://scholarcommons.usf.edu/etd/1149.
Повний текст джерелаKundur, Abhinay. "Digital and Analog Signal Encryption and Decryption in Mid RF Range Using Hybrid Acousto-Optic Chaos." University of Dayton / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1336100009.
Повний текст джерелаКниги з теми "Decryption"
Martínez-Guerra, Rafael, Juan Javier Montesinos-García, and Juan Pablo Flores-Flores. Encryption and Decryption Algorithms for Plain Text and Images using Fractional Calculus. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20698-6.
Повний текст джерелаPaulus, Max. Der Diskos von Phaistos: Ein Ansatz zu seiner Entschlüsselung / = The Phaistos disk : an approach to its decryption. 2nd ed. Hamburg: Verlag Dr. Kovac, 2017.
Знайти повний текст джерелаPaulus, Max. Der Diskos von Phaistos: Ein Ansatz zu seiner Entschlüsselung = The Phaistos disk : an approach to its decryption. Hamburg: Kovac, 2014.
Знайти повний текст джерелаDecryption. KJB Writing Services, 2023.
Знайти повний текст джерелаDecryption. KJB Writing Services, 2023.
Знайти повний текст джерелаBeardsley, Ian. Et Decryption. Lulu Press, Inc., 2016.
Знайти повний текст джерелаMarks, Philip. Decryption Engine. Independently Published, 2016.
Знайти повний текст джерелаCountdown to Decryption. Pandamoon Publishing, 2024.
Знайти повний текст джерелаMuniraj, Inbarasan, and John T. Sheridan. Optical Encryption and Decryption. SPIE, 2019. http://dx.doi.org/10.1117/3.2523506.
Повний текст джерелаDecryption of Indus Scripts. Internet, 2012.
Знайти повний текст джерелаЧастини книг з теми "Decryption"
Weik, Martin H. "decryption." In Computer Science and Communications Dictionary, 372. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_4547.
Повний текст джерелаKaliski, Burt. "Decryption Exponent." In Encyclopedia of Cryptography and Security, 322. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_400.
Повний текст джерелаMu, Yi, Vijay Varadharajan, and Khan Quac Nguyen. "Delegated Decryption." In Cryptography and Coding, 258–69. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-46665-7_30.
Повний текст джерелаRyan, Mark D. "Making Decryption Accountable." In Security Protocols XXV, 93–98. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-71075-4_11.
Повний текст джерелаGreen, Matthew. "Secure Blind Decryption." In Public Key Cryptography – PKC 2011, 265–82. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19379-8_16.
Повний текст джерелаHassan, Nihad A. "Ransomware Decryption Tools." In Ransomware Revealed, 191–201. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4255-1_8.
Повний текст джерелаKävrestad, Joakim. "Decryption and Password Enforcing." In Fundamentals of Digital Forensics, 39–46. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-96319-8_5.
Повний текст джерелаKävrestad, Joakim. "Decryption and Password Enforcing." In Fundamentals of Digital Forensics, 47–55. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38954-3_5.
Повний текст джерелаOhta, Kazuo. "Remarks on blind decryption." In Lecture Notes in Computer Science, 109–15. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0030413.
Повний текст джерелаArmour, Marcel, and Bertram Poettering. "Subverting Decryption in AEAD." In Cryptography and Coding, 22–41. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-35199-1_2.
Повний текст джерелаТези доповідей конференцій з теми "Decryption"
Zivic, Natasa, Esad Kadusic, and Mirko Skrbic. "Mathematical optimization of decrypting algorithm for soft input decryption." In 2009 XXII International Symposium on Information, Communication and Automation Technologies (ICAT 2009). IEEE, 2009. http://dx.doi.org/10.1109/icat.2009.5348411.
Повний текст джерелаMüller, Jens, Fabian Ising, Vladislav Mladenov, Christian Mainka, Sebastian Schinzel, and Jörg Schwenk. "Practical Decryption exFiltration." In CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3319535.3354214.
Повний текст джерелаKalaichelvi, V., and R. M. Chandrasekaran. "FSPAlgorithm for encryption/decryption." In 2008 International Conference on Computing, Communication and Networking (ICCCN). IEEE, 2008. http://dx.doi.org/10.1109/icccnet.2008.4787779.
Повний текст джерелаGahi, Youssef, Farid Bourennani, Mouhcine Guennoun, and Hussein T. Mouftah. "Blind decryption for cloud computing." In 2016 IEEE Symposium on Computers and Communication (ISCC). IEEE, 2016. http://dx.doi.org/10.1109/iscc.2016.7543875.
Повний текст джерелаJayanthi, MS M., Alwin J. Ajay, Kavya Vijayakumar, and Surya G. Prakash. "Detection and Decryption of Ransomware." In 2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC). IEEE, 2023. http://dx.doi.org/10.1109/icaaic56838.2023.10140747.
Повний текст джерелаSaudagar, Saleha, Neha Kamtalwar, Harsh Karadbhajne, Mandar Karmarkar, Harshvardhan Kendre, and Ojas Ketkar. "File Encryption-Decryption using Java." In 2023 International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT). IEEE, 2023. http://dx.doi.org/10.1109/idciot56793.2023.10053514.
Повний текст джерелаCohen, Aloni, Sarah Scheffler, and Mayank Varia. "Can the Government Compel Decryption?" In CSLAW '22: Symposium on Computer Science and Law. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3511265.3550441.
Повний текст джерелаQuirem, Saddam, and Byeong Kil Lee. "AES decryption using warp-synchronous programming." In 2012 IEEE 31st International Performance Computing and Communications Conference (IPCCC). IEEE, 2012. http://dx.doi.org/10.1109/pccc.2012.6407714.
Повний текст джерелаMcHardy, Patrick, Andreas Schuler, and Erik Tews. "Interactive decryption of DECT phone calls." In the fourth ACM conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/1998412.1998426.
Повний текст джерелаTao, Shaohua. "A Practical Holographic Encryption/Decryption Technique." In Biomedical Optics. Washington, D.C.: OSA, 2012. http://dx.doi.org/10.1364/biomed.2012.jm3a.57.
Повний текст джерелаЗвіти організацій з теми "Decryption"
Negron, Melvin S. Study of the Hill Cipher Encryption/Decryption Algorithm. Fort Belvoir, VA: Defense Technical Information Center, April 2012. http://dx.doi.org/10.21236/ada581720.
Повний текст джерелаDolmatov, V., ed. GOST 28147-89: Encryption, Decryption, and Message Authentication Code (MAC) Algorithms. RFC Editor, March 2010. http://dx.doi.org/10.17487/rfc5830.
Повний текст джерелаFedoseev, O. N. Calculation of the coverage area based on GOOGLE EARTH satellite images (MAP PIXEL-decryption V1.1 ). Ailamazyan Program Systems Institute of Russian Academy of Sciences, January 2024. http://dx.doi.org/10.12731/ofernio.2023.25277.
Повний текст джерелаEverett, Martin. EU–US collaboration on quantum technologies. Royal Institute of International Affairs, January 2021. http://dx.doi.org/10.55317/9781784134211.
Повний текст джерелаvon Luckner, Clemens Graf, Carmen Reinhart, and Kenneth Rogoff. Decrypting New Age International Capital Flows. Cambridge, MA: National Bureau of Economic Research, October 2021. http://dx.doi.org/10.3386/w29337.
Повний текст джерела