Start Code-Based Encryption and Decryption Framework for HEVC
نویسندگان
چکیده
منابع مشابه
Attribute based Encryption and Decryption Technique
Inside a dispersed foriegn atmosphere, anyone receives a untrusted company which has a change for better crucial allowing this foriegn to turn any kind of ABE ciphertext fulfilled through the wearer's features. Stability of ABE technique with outsourced decryption makes certain that a foe (including any destructive cloud) aren't going to be capable to study everything about the encrypted meanin...
متن کاملTime stamp based ECC encryption and decryption
Elliptic Curve Cryptography (ECC) provides a secure means of exchanging keys among communicating hosts using the diffie hellman key exchange algorithm. Encryption and decryption of texts and messages have also been attempted. In the paper on Knapsack over ECC algorithm, the authors presented the implementation of ECC by first transforming the message into an affine point on the EC, and then app...
متن کاملKnapsack Based ECC Encryption and Decryption
Elliptic Curve Cryptography provides a secure means of exchanging keys among communicating hosts using the Diffie Hellman Key Exchange algorithm. Encryption and Decryption of texts and messages have also been attempted. This paper presents the implementation of ECC by first transforming the message into an affine point on the EC, and then applying the knapsack algorithm on ECC encrypted message...
متن کاملAttribute-based encryption with encryption and decryption outsourcing
In this paper we propose a new scheme for ciphertext-policy attribute-based encryption that allows outsourcing of computationally expensive encryption and decryption steps. The scheme constitutes an important building block for mobile applications where both the host and users use mobile devices with limited computational power. In the proposed scheme, during encryption the host involves a semi...
متن کاملBitwise Operations Based Encryption and Decryption
In this paper, variable block length based character/bit level transformation has been proposed for encryption and decryption, where a block of characters /few bits has taken into account. The originated text is transformed into decimal values and passed to encoder module. In this module values are cluttered using binary operations present in most systems with keys. This routine is based on fei...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2020
ISSN: 2169-3536
DOI: 10.1109/access.2020.3036023