[PDF][PDF] An encryption technique based upon encoded multiplier with controlled generation of random numbers

SK Pal - International Journal of Computer Network and …, 2015 - mecs-press.org
This paper presents an encryption technique based on independent random number
generation for every individual message sent based upon a pass key which depends upon a …

Implementation of public key crypto processor with probabilistic encryption on FPGA for nodes in wireless sensor networks

G Leelavathi, K Shaila… - 2018 9th International …, 2018 - ieeexplore.ieee.org
Cryptographic algorithms are fundamental to the secure communications over Wireless
Sensor Networks. This paper presents complete public key cryptosystem with mathematical …

An efficient video Steganography technique for secured data transmission

D Job, V Paul - 2016 International Conference on Data Mining …, 2016 - ieeexplore.ieee.org
Secured data transmission is an important problem faced by everyone nowadays.
Steganography is an efficient technique to provide secure data transmission over the …

Performance Analysis of Probabilistic Encryption on FPGA for Wireless Sensor Nodes

G Leelavathi, K Shaila, KR Venugopal - Journal of The Institution of …, 2022 - Springer
The public key cryptography processor with probabilistic encryption is designed, and its
performance with area and execution speed is analyzed as throughput rate. The processor …

[PDF][PDF] Enhancing security through steganography by using sudoku puzzle and ecc algorithm

B Chithra, D Harinath, MVR Murthy… - Int. J. Res. Sci. Eng …, 2015 - academia.edu
Now-a-days, data transmission becoming very important among us. There are many modes
of transmission of data, but secured data transmission is an important thing what everyone …

A Ciphering Algorithm on Squaring and Sine Function using Sequence of Random Numbers

SK Pal, S De - 2015 - indianjournals.com
This paper provides a ciphering algorithm based on controlled random number generation
for every printable character of a keyboard based on a pass key which depends upon a …

[PDF][PDF] Probabilistic Encryption and Decryption for Message Decoding

VG Valley - jvwu.ac.in
In the current scenario of the world, the technologies have advanced so much that most of
the people prefer working with the internet as the main medium to transfer data or messages …

[PDF][PDF] A Novel Review on Biometric System Based on Digital Signal Processing

DJ Uppari - Citeseer
Biometric system is a device used to identify the individual based on physiological or
behavior characteristics. The unique identification can be measured either through …

Probabilistic (Multiple Cipher) Based ECC Mechanism

AVN Krishna - Journal of Discrete Mathematical Sciences and …, 2012 - Taylor & Francis
Abstract Elliptic Curve Cryptography provides a secure means of Data Transfer among
participating parties at low computing over head. In the implementation of ECC, the …

An Improvised ECC Mechanism with Probabilistic Approach

AVN Krishna - Information Security Journal: A Global Perspective, 2012 - Taylor & Francis
Elliptic curve cryptography provides a secure means of exchanging keys among
communicating hosts using the Diffie-Hellman Key Exchange algorithm. Encryption and …