„encryption algorithm“
Suchergebnisse
883 Treffer
-
Generic SCARE: reverse engineering without knowing the algorithm nor the machine
-
A novel image encryption algorithm based on hyperchaotic system with cross-feedback structure and diffusive DNA coding operations
-
Image scrambling encryption using chaotic map and genetic algorithm: a hybrid approach for enhanced security
-
An image encryption algorithm based on a new Sine-Logistic chaotic system and block dynamic Josephus scrambling
-
Serialisation of inversion-based S-boxes – concept and application to the advanced encryption standard (AES)
-
Cryptography and Cryptanalysis in Java – Creating and Programming Advanced Algorithms with Java SE 21 LTS and Jakarta EE 11
-
Enhancing data security using Laplacian of Gaussian and Chacha20 encryption algorithm
-
Watermarking via optimization algorithms for quantizing randomized semi-global image statistics
-
Secure Hash Algorithm SHA-3
-
CTEA: Chaos based tiny encryption algorithm using ECDH and TinkerBell map for data security in supply chain management
-
Partial-privacy image encryption algorithm based on time-varying delayed exponentially controlled chaotic system
-
Image encryption algorithm based on COA and hyperchaotic Lorenz system
-
Novel image encryption algorithm using hybrid 3D-ICPCM and hessenberg decomposition
-
Cryptanalysis and security evaluation of optimized algorithms for image encryption in deep optimal network
-
Enhanced QSimon Algorithm for Attacking the Offset Two‐Round Scheme
-
Efficient quantum algorithms for some instances of the semidirect discrete logarithm problem
-
Optimized Homomorphic Encryption (OHE) algorithms for protecting sensitive image data in the cloud computing environment
-
A Region-Selective Anti-compression Image Encryption Algorithm Based on Deep Networks
-
Enhanced image encryption using AES algorithm with CBC mode: a secure and efficient approach
-
Study on Applications of Reversible Information Hiding Algorithms Based on Discrete Cosine Transform Coefficient and Frequency Band Selection in JPEG Image Encryption