نتایج جستجو برای: simultaneous encryption

تعداد نتایج: 143810  

Journal: :Mathematics 2023

The widespread adoption of cloud infrastructures has revolutionized data storage and access. However, it also raised concerns regarding the privacy sensitive data. To address these concerns, encryption techniques have been widely used. traditional schemes limit efficient search retrieval encrypted tackle this challenge, innovative approaches emerged, such as utilization Homomorphic Encryption (...

Journal: :Asia-pacific Journal of Convergent Research Interchange 2016

2012
JOHN SINGH

Major issues in video data transfer over the internet are security and speed. For fast transmission over the network, the video data should be compressed before transmission. Joint compression and encryption algorithms employ compression before encryption for secured and fast data transfer over the internet. In this paper, a joint compression and encryption algorithm, Puzzle Fast Random Bit Enc...

2011
Cheng Chen Zhenfeng Zhang Dengguo Feng

Spatial encryption was first proposed by Boneh and Hamburg in 2008. It is one implementation of the generalized identity-based encryption schemes and many systems with a variety of properties can be derived from it. Recently, Hamburg improved the notion by presenting a variant called doubly-spatial encryption. The doubly-spatial encryption is more powerful and expressive. More useful cryptograp...

2012
Mufeed Juma ALMashrafi

Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric...

2014
Aumreesh Saxena Sourabh Singh

The world It know today would be impossible without cryptography. This Paper are presenting study of cryptography and problem associating with existing encryption model is also presented. Furthermore this is proposing encryption model. This encryption model is based on the block cipher concept where it will be encrypt and decrypt any type of data file. The primary goal of this paper is to impro...

2006
K. Jaganathan L. Zhu J. Brezak

The Microsoft Windows 2000 implementation of Kerberos introduces a new encryption type based on the RC4 encryption algorithm and using an MD5 HMAC for checksum. This is offered as an alternative to using the existing DES-based encryption types. The RC4-HMAC encryption types are used to ease upgrade of existing Windows NT environments, provide strong cryptography (128-bit key lengths), and provi...

2010
Dongdong Sun Colin Boyd Juan Manuel González Nieto

Predicate encryption has an advantage over traditional publickey or identity-based encryption, since predicate encryption systems provide more flexible control over access to encrypted data. We focus on delegation capabilities in predicate systems. More specifically, we investigate delegatable encryption systems supporting disjunctive predicate evaluations. We present formal security definition...

Journal: :CoRR 2012
Yixin Liu Haipeng Zhang Tao Feng

In order to protect the security of network data, a high speed chip module for encrypting and decrypting of network data packet is designed. The chip module is oriented for internet information security SOC (System on Chip) design. During the design process, AES (Advanced Encryption Standard) and 3DES (Data Encryption Standard) encryption algorithm are adopted to protect the security of network...

2009
K. L. Man M. Mercaldi H. L. Leung

This paper presents our industrial experience on the implementation of SpeedyDes3 encryption which is a speed up version of the Des3 encryption. This SpeedyDes3 encryption improves the standard Des3 encryption by means of speed and memory usage. Our SpeedyDes3 encryption is particular suitable for use/running in small systems. We have applied the SpeedyDes3 for the encryption of data in video p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید