Nowadays the security of multimedia data storage and transfer is becoming a major concern. The traditional encryption methods such as DES, AES, 3-DES, and RSA cannot be …
Using a new key management system and Jacobian elliptic map, a new speech encryption scheme has been developed for secure speech communication data. Jacobian elliptic map …
Speech encryption approaches are used to prevent eavesdropping, tracking, and other security concerns in speech communication. In this paper, a new cryptography algorithm is …
The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data …
This work proposes a new fractional-order form of a Discrete-time macroeconomic system based on the Caputo–like difference operator. The dynamics of the proposed system are …
One of the cryptography classifications is asymmetric cryptography, which uses two different keys to encrypt and decrypt the message. This paper discusses a review of RSA scheme of …
Although it was first developed and studied in the late 1970s and early 1977s, the Data Encryption Standard (DES) algorithm has grown in popularity. There are two causes for this …
K Paul, MM Singh, P Goswami - Nonlinear Dynamics and Applications …, 2022 - Springer
The Dickson polynomials are widely used in different context. Because of the permutation behaviors and semi-group property under composition, its application can also be noticed in …
Vehicle to vehicle (V2V) communication has many applications in intelligent transportation system (ITS) like smart grid systems, fleet management and traffic light control. It aims to …