The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase encryption/decryption (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-2000 (15) 2001-2002 (19) 2003-2004 (27) 2005 (18) 2006 (20) 2007 (15) 2008 (19) 2009 (16) 2010-2014 (18) 2015-2020 (18) 2021-2024 (14)
Publication types (Num. hits)
article(44) incollection(2) inproceedings(153)
Venues (Conferences, Journals, ...)
ISCAS(5) ISCAS (4)(4) ISCAS (5)(4) ASP-DAC(3) EUROCRYPT(3) FSE(3) ACISP(2) ACIVS(2) ACSAC(2) Autom.(2) CCS(2) CHES(2) CIS(2) CoRR(2) CSFW(2) Des. Codes Cryptogr.(2) More (+10 of total 156)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 175 occurrences of 143 keywords

Results
Found 199 publication records. Showing 199 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
102Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF compact encryption/decryption implementation, FPGA, Cryptography, AES, DES
93Peter Phuong Vo, Chau Maggie Vo FMS and FMSE encryption/decryption algorithms using flipping, mapping, and shifting operations. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF encryption/decryption using flipping, shifting operations, mapping
73Vartika Singh, D. R. Lakshminarasimhaiah, Yogesh Mishra, Chitra Viswanathan, G. Athithan 0001 An Implementation and Evaluation of Online Disk Encryption for Windows Systems. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Disk encryption, Initialization vector, Storage data encryption/decryption and Sector-level encryption, Storage security
66Rong-Jian Chen, Yi-Te Lai, Jui-Lin Lai Architecture design and VLSI hardware implementation of image encryption/decryption system using re-configurable 2D Von Neumann cellular automata. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
63Shay Gueron Intel's New AES Instructions for Enhanced Performance and Security. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF new instructions set, computer architecture, Advanced Encryption Standard
62Charlie Obimbo, Behzad Salami 0002 A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption. Search on Bibsonomy J. Supercomput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Inverse of a matrix, Row-echelon reduction, Parallel Algorithms, Cryptography, Block Ciphers, Modular arithmetic, Systems of linear equations
58Jen-Chieh Lai, Chia-Hui Wang Buffer Occupancy Feedback Security Control and Changing Encryption Keys to Protect MOD Services. Search on Bibsonomy PSIVT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF encryption/decryption, playback buffer occupancy (PBO), feedback control, MOD
54Ayman Alfalou, Alain Loussert, Abdulsalam Alkholidi, Rami El Sawda System for Image Compression and Encryption by Spectrum Fusion in Order to Optimize Image Transmission. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Signal and Image Processing, Image Compres- sion/Decompression, Image Encryption/Decryption, Trans- mission, FFT, DCT
52David A. Barr Copy Protection for High-Definition Baseband Video. Search on Bibsonomy ITCC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
49Guido Bertoni, Luca Breveglieri, Israel Koren, Paolo Maistri, Vincenzo Piuri Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF parity codes, fault tolerance, fault detection, Advanced Encryption Standard, AES
39Eun-Jun Yoon, Kee-Young Yoo Token-Based Authenticated Key Establishment Protocols for Three-Party Communication. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Three-party, Authentication, Cryptography, Password, Key agreement, Token
36Huizhang Shen, Jidi Zhao, Huanchen Wang Illegal Intrusion Detection Based on Hidden Information Database. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Guido Bertoni, Luca Breveglieri, Israel Koren, Paolo Maistri, Vincenzo Piuri A Parity Code Based Fault Detection for an Implementation of the Advanced Encryption Standard. Search on Bibsonomy DFT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
34Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild Distributing the Encryption and Decryption of a Block Cipher. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF thereshold cryptography, block cipher, secret sharing, shared computation
32Praveen R. Samala, Hamid Vakilzadian, Dietmar P. F. Möller Modeling and simulation of common primitive operations used in block ciphers. Search on Bibsonomy SCSC The full citation details ... 2007 DBLP  BibTeX  RDF discrete event simulation, hardware modeling, encryption algorithms
32Shiuh-Jeng Wang, Hung Hsuan Chen, Pin-You Chen, Yuh-Ren Tsai Security Cryptanalysis in High-Order Improved Fast Encryption Algorithm for Multimedia. Search on Bibsonomy FGCN (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Eike Kiltz Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
31Jae-Pyo Park, Hong-jin Kim, Keun-Wang Lee, Keun-Soo Lee A PKI Based Digital Rights Management System for Safe Playback. Search on Bibsonomy ICIC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Pawel Chodowiec, Kris Gaj, Peter Bellows, Brian Schott Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator Board. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
28Ahmet Can Mert, Erdinç Öztürk, Erkay Savas Design and Implementation of Encryption/Decryption Architectures for BFV Homomorphic Encryption Scheme. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Chitra Rajarama, Jagadeesha Narasimhamurthy Sugatoor, T. Yerri Swamy Diffie-Hellman Type Key Exchange, ElGamal Like Encryption/Decryption and Proxy Re-encryption Using Circulant Matrices. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2018 DBLP  BibTeX  RDF
27Sherman S. M. Chow, Siu-Ming Yiu Timed-Release Encryption Revisited. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF release-time confidentiality, Timed-release encryption
27François-Xavier Standaert, Gilles Piret, Neil Gershenfeld, Jean-Jacques Quisquater SEA: A Scalable Encryption Algorithm for Small Embedded Applications. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Istemi Ekin Akkus, Öznur Özkasap, M. Reha Civanlar Secure Transmission of Video on an End System Multicast Using Public Key Cryptography. Search on Bibsonomy MRCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Marius Marcu, Dacian Tudor, Sebastian Fuicu Power efficiency analysis of multimedia secured mobile applications. Search on Bibsonomy IWCMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF encoding/decoding, encryption/decryption, mobile devices, energy efficiency, wireless communication, power consumption, multimedia applications
27Pravin Revankar, W. Z. Gandhare, Dilip Rathod Neural Synchronization with Queries. Search on Bibsonomy ICSAP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Neural cryptography, mutual learning, tree parity machine, neural synchronization, encryption/decryption, neural network, query
27Rajiv K. Nekkanti, Chung-wei Lee Trust based adaptive on demand ad hoc routing protocol. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF encryption/decryption, trust factor, AODV, security level, ad-hoc routing protocol
27Lein Harn, David Huang A Protocol for Establishing Secure Communication Channels in a Large Network. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF secure communication channels, open media, large distributed network, data attack vulnerability, data encryption/decryption techniques, secret session key, locally trusted centers, public-key distribution, RSA encryption scheme, authentication, protocols, protocol, computer networks, public key cryptography, security of data, key distribution, information access, data storage, data transformation, telecommunication channels, multi-user system, knowledge exchange
26Mabroka Ali Mayouf, Zarina Shukur Using Animation in Active Learning Tool to Detect Possible Attacks in Cryptographic Protocols. Search on Bibsonomy IVIC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF possible attacks, animation, active learning, cryptographic protocols, visual metaphor
26Sandip Dutta, Avijit Kar, N. C. Mahanti, B. N. Chatterji Network Security Using Biometric and Cryptography. Search on Bibsonomy ACIVS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptography, Biometric, Watermarking, DES, MD5
26Ling Cheung, Calvin C. Newport Provably secure ciphertext policy ABE. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF access control, public key cryptography, attribute-based encryption
26Ricardo Chaves, Georgi Kuzmanov, Stamatis Vassiliadis, Leonel Sousa Reconfigurable memory based AES co-processor. Search on Bibsonomy IPDPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Khaled Z. Ibrahim Efficient Architectural Support for Secure Bus-Based Shared Memory Multiprocessor. Search on Bibsonomy Asia-Pacific Computer Systems Architecture Conference The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Jun-Hong Chen, Ming-Der Shieh, Chien-Ming Wu Concurrent algorithm for high-speed point multiplication in elliptic curve cryptography. Search on Bibsonomy ISCAS (5) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Qianhong Wu, Bo Qin, Changjie Wang, Xiaofeng Chen 0001, Yumin Wang t-Out-of-n String/Bit Oblivious Transfers Revisited. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF block cipher design, side-channel resistance, reconfigurable hardware, efficient implementations
26Seungjoo Kim, Masahiro Mambo, Yuliang Zheng 0001 Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Kerckhoffs' assumption, provable security, chosen-ciphertext security
26Jiande Zheng A New Public Key Cryptosystem for Constrained Hardware. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Yukio Mitsuyama, Zaldy Andales, Takao Onoye, Isao Shirakawa A dynamically reconfigurable hardware-based cipher chip. Search on Bibsonomy ASP-DAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
26Yukio Mitsuyama, Zaldy Andales, Takao Onoye, Isao Shirakawa VLSI architecture of dynamically reconfigurable hardware-based cipher. Search on Bibsonomy ISCAS (4) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
23Anil Yekkala, C. E. Veni Madhavan Bit Domain Encryption. Search on Bibsonomy ACIVS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Aslan Askarov, Daniel Hedin, Andrei Sabelfeld Cryptographically-Masked Flows. Search on Bibsonomy SAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Rong-Jian Chen, Yi-Te Lai, Jui-Lin Lai Architecture design of the re-configurable 2-D von Neumann cellular automata for image encryption application. Search on Bibsonomy ISCAS (4) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat Efficient Uses of FPGAs for Implementations of DES and Its Experimental Linear Cryptanalysis. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF FPGA, Cryptography, DES, linear cryptanalysis, efficient implementations
23Yeong-Kang Lai, Yu-Chuan Shu VLSI architecture design and implementation for BLOWFISH block cipher with secure modes of operation. Search on Bibsonomy ISCAS (4) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
23Ronald Mraz Secure Blue: An Architecture for a Scalable, Reliable, High Volume SSL Internet Server. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
22Wei Chen 0091, Zidong Wang, Quanbo Ge, Hongli Dong, Guo-Ping Liu 0003 Quantized Distributed Economic Dispatch for Microgrids: Paillier Encryption-Decryption Scheme. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Bogang Qu, Zidong Wang, Bo Shen 0001, Hongli Dong, Xin Zhang 0028 Secure Particle Filtering With Paillier Encryption-Decryption Scheme: Application to Multi-Machine Power Grids. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Xiang-Gui Guo, Bo-Qun Wang, Jian-Liang Wang, Choon Ki Ahn, Zheng-Guang Wu Edge-event-triggered encryption-decryption observer-based control of multiagent systems for privacy protection under multiple cyber attacks. Search on Bibsonomy Inf. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Lei Zou 0003, Zidong Wang, Bo Shen 0001, Hongli Dong Encryption-Decryption-Based State Estimation With Multirate Measurements Against Eavesdroppers: A Recursive Minimum-Variance Approach. Search on Bibsonomy IEEE Trans. Autom. Control. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Tongxiang Li, Zidong Wang, Lei Zou 0003, Bo Chen 0003, Li Yu 0001 A dynamic encryption-decryption scheme for replay attack detection in cyber-physical systems. Search on Bibsonomy Autom. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Chen Gao, Zidong Wang, Xiao He 0001, Hongli Dong Fault-Tolerant Consensus Control for Multiagent Systems: An Encryption-Decryption Scheme. Search on Bibsonomy IEEE Trans. Autom. Control. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Noor Sattar Noor, Dalal Abdulmohsin Hammood, Ali Al-Naji, Javaan S. Chahl A Fast Text-to-Image Encryption-Decryption Algorithm for Secure Network Communication. Search on Bibsonomy Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22M. N. Sharada Guptha, M. N. Eshwarappa RL-BLED: A Reversible Logic Design of Bit Level Encryption/Decryption Algorithm for Secure Mammogram Data Transmission. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Youngmo Kim, Byeongchan Park, Seok-Yoon Kim A Selective Encryption/Decryption Method of Sensitive Music Usage History Information on Theme, Background and Signal Music Blockchain Network. Search on Bibsonomy J. Web Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Lili Zhou, Xiaohui Li, Fei Tan, Yi Huang, Weina Ma A two-layer networks-based audio encryption/decryption scheme via fixed-time cluster synchronization. Search on Bibsonomy Soft Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Ahmed Maache, Anouar Touati, Ayoub Ouali Implementation of an AES-based real-time Video Encryption/Decryption using FPGA/HPS. Search on Bibsonomy SSD The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Chen Gao, Zidong Wang, Xiao He 0001, Hongli Dong Encryption-decryption-based consensus control for multi-agent systems: Handling actuator faults. Search on Bibsonomy Autom. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Xin Huang, David Arnold 0006, Tianyang Fang, Jafar Saniie A Chaotic-based Encryption/Decryption System for Secure Video Transmission. Search on Bibsonomy EIT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Amal Hafsa, Jihene Malek, Mohsen Machhout Performance trade-offs of hybrid cryptosystem for medical images encryption - decryption. Search on Bibsonomy SSD The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Xin Zheng 0001, Chongyao Xu, Xianghong Hu, Yun Zhang 0001, Xiaoming Xiong The Software/Hardware Co-Design and Implementation of SM2/3/4 Encryption/Decryption and Digital Signature System. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Sakshi Patel, Bharath K. P, Rajesh Kumar Muthu Image Encryption Decryption Using Chaotic Logistic Mapping and DNA Encoding. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
22Ibrahim Yasser, Mohamed Azim Mohamed, Ahmed Shaban Samrah, Fahmi Khalifa A Chaotic-Based Encryption/Decryption Framework for Secure Multimedia Communications. Search on Bibsonomy Entropy The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22P. Mathivanan, A. Balaji Ganesh, R. Venkatesan 0001 QR code-based ECG signal encryption/decryption algorithm. Search on Bibsonomy Cryptologia The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni 0001 Compact circuits for combined AES encryption/decryption. Search on Bibsonomy J. Cryptogr. Eng. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Amjad Yosef Hendi, Majed O. Dwairi, Ziad Abdulkareem Al-Qadi, Mohamed S. Soliman A NOVEL SIMPLE AND HIGHLY SECURE METHOD FOR DATA ENCRYPTION-DECRYPTION. Search on Bibsonomy Int. J. Commun. Networks Inf. Secur. The full citation details ... 2019 DBLP  BibTeX  RDF
22Kevin Herman Muraro Gularte, Luíza F. Q. Martins, José Alfredo Ruiz Vargas, João Paulo A. Maranhão, Willian A. M. Gabalan, Jesus Franklin Andrade Romero A Scheme for Encryption/Decryption based on Hyperchaotic Systems and Lyapunov Theory. Search on Bibsonomy ICSPCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Harshad R. Pawar, Dinesh G. Harkut Classical and Quantum Cryptography for Image Encryption & Decryption. Search on Bibsonomy RICE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Magdy Ibrahim ElSharkawy Quaternion-based Encryption/Decryption of Audio Signal Using Digital Image as Variable Key. Search on Bibsonomy Int. J. Commun. Networks Inf. Secur. The full citation details ... 2017 DBLP  BibTeX  RDF
22Lijuan Li 0002, Shuguo Li High throughput AES encryption/decryption with efficient reordering and merging techniques. Search on Bibsonomy FPL The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Dur-e-Shahwar Kundi, Arshad Aziz, Nassar Ikram A high performance ST-Box based unified AES encryption/decryption architecture on FPGA. Search on Bibsonomy Microprocess. Microsystems The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni 0001 Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
22Colleen Heinemann, Sai Shankar Chaduvu, Adam Byerly, Alexander Uskov OpenCL and CUDA software implementations of encryption/decryption algorithms for IPsec VPNs. Search on Bibsonomy EIT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Yi Wang 0016, Yajun Ha High throughput and resource efficient AES encryption/decryption for SANs. Search on Bibsonomy ISCAS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni 0001 Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core. Search on Bibsonomy INDOCRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Rodica-Mihaela Teodorescu, Ioan Lita, Ion Bogdan Cioc, Daniel Alexandru Visan Virtual instrumentation application for symmetrical and asymmetrical text encryption/decryption studying. Search on Bibsonomy ECAI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Yixin Liu, Haipeng Zhang, Tao Feng Design of an Encryption-Decryption Module Oriented for Internet Information Security SOC Design. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
22Prakash Kuppuswamy, Saeed Q. Y. Al-Khalidi Hybrid encryption/decryption technique using new public key and symmetric key algorithm. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Xianhua Song, Xiamu Niu Comment on: Novel image encryption/decryption based on quantum fourier transform and double phase encoding. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Xu Bai, Lei Jiang 0003, Xinxing Liu, Jianlong Tan RSA Encryption/Decryption Implementation Based on Zedboard. Search on Bibsonomy ISCTCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Ye Yan, Tao Shu Energy-efficient In-network encryption/decryption for wireless body area sensor networks. Search on Bibsonomy GLOBECOM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Yi Wang 0016, Akash Kumar 0001, Yajun Ha FPGA-based high throughput XTS-AES encryption/decryption for storage area network. Search on Bibsonomy FPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Yu-Guang Yang 0001, Juan Xia, Xin Jia, Hua Zhang Novel image encryption/decryption based on quantum Fourier transform and double phase encoding. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Nooshin Bigdeli 0001, Yousef Farid, Karim Afshar A novel image encryption/decryption scheme based on chaotic neural networks. Search on Bibsonomy Eng. Appl. Artif. Intell. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
22Boris S. Verkhovsky Double-Moduli Gaussian Encryption/Decryption with Primary Residues and Secret Controls. Search on Bibsonomy Int. J. Commun. Netw. Syst. Sci. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
22Gerassimos D. Barlas, Ahmed Hassan, Yasser Al Jundi An Analytical Approach to the Design of Parallel Block Cipher Encryption/Decryption: A CPU/GPU Case Study. Search on Bibsonomy PDP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
22Anil Hingmire, D. R. Ingle, Rahul Ambekar A new data encryption & decryption algorithm (PSZ proposal): a comparison with RSA. Search on Bibsonomy ICWET The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
22D. Ganotra, S. S. Mantha, A. Vinaya Babu Encryption decryption algorithm for m-commerce. Search on Bibsonomy ICWET The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
22Kuo-Ching Liu, Hui-Feng Huang A New Design of Encryption/Decryption for Field Applications. Search on Bibsonomy J. Convergence Inf. Technol. The full citation details ... 2010 DBLP  BibTeX  RDF
22P. Karthigaikumar, K. Baskaran Partially Pipelined VLSI Implementation of Blowfish Encryption/Decryption Algorithm. Search on Bibsonomy Int. J. Image Graph. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
22Vasily Dolmatov GOST 28147-89: Encryption, Decryption, and Message Authentication Code (MAC) Algorithms. Search on Bibsonomy RFC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
22Rajaram Ramasamy, Amutha Prabakar Muniyandi, M. Indra Devi A new algorithm for encryption/decryption for field applications. Search on Bibsonomy Comput. Stand. Interfaces The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Weiping Zhang 0003, Wenyuan Chen, Jian Tang, Peng Xu, Yibin Li, Shengyong Li The Development of a Portable Hard Disk Encryption/Decryption System with a MEMS Coded Lock. Search on Bibsonomy Sensors The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Jesús Lázaro 0001, Armando Astarloa, Unai Bidarte, Jaime Jimenez, Aitzol Zuloaga AES-Galois Counter Mode Encryption/Decryption FPGA Core for Industrial and Residential Gigabit Ethernet Communications. Search on Bibsonomy ARC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Kuo-Huang Chang, Yi-Cheng Chen, Chung-Cheng Hsieh Live Demonstration: Embedded a Low Area 32-bit AES for Image Encryption/Decryption Application. Search on Bibsonomy ISCAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Kuo-Huang Chang, Yi-Cheng Chen, Chung-Cheng Hsieh, Chi-Wu Huang, Chi-Jeng Chang Embedded a Low Area 32-bit AES for Image Encryption/decryption Application. Search on Bibsonomy ISCAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Chayan Dutta, Thakar Lalitkrushna, Annie Nelson, S. R. Nagaraj, P. Lakshminarasimhan A New Encryption-Decryption Scheme that Solves Key Management Problem in Remote Sensing Satellite. Search on Bibsonomy ICETET The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Mark White, Tai-Chi Lee, Michael Gubody Blowfish Encryption/Decryption Using FPGA and Custom Instructions. Search on Bibsonomy PDPTA The full citation details ... 2008 DBLP  BibTeX  RDF
22Robert Sliz, Min-Yung Chang, Min-Jui Huang Secure Encryption, Decryption and Internet-based Transfer of the Binary Images. Search on Bibsonomy iiWAS The full citation details ... 2007 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 199 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license