-
1
المؤلفون: Megyesi, Beáta, Professor, 1971, Tudor, Crina, Láng, Benedek, Lehofer, Anna, Kopal, Nils, de Leeuw, Karl, Waldispühl, Michelle
المصدر: Cryptologia. 48(2):97-139
مصطلحات موضوعية: cryptanalysis, cipher keys, DECRYPT project, historical cryptology, Computational Linguistics, Datorlingvistik
وصف الملف: electronic
-
2Academic Journal
المؤلفون: Hou Shuangshuang, Jiang Jincheng, Wang Xibao, Gao Chengcheng, Xu Jiali
المصدر: Applied Mathematics and Nonlinear Sciences, Vol 9, Iss 1 (2024)
مصطلحات موضوعية: frida, decrypt, mpaas, bonreeagent, 03b70, Mathematics, QA1-939
وصف الملف: electronic resource
Relation: https://doaj.org/toc/2444-8656
-
3Academic Journal
المؤلفون: Hajra Rasmita Ngemba, Aimar Anand, Syaiful Hendra, Anita Ahmad Kasim, Elyana Aulia Chandra
المصدر: Tadulako Science and Technology Journal ; Vol. 5 No. 1 (2024): Tadulako Science and Technology Journal; 22-32 ; 2776-4893 ; 2776-4907 ; 10.22487/sciencetech.v5i1
مصطلحات موضوعية: Encryption, RSA, AES, Decrypt, Cryptography
وصف الملف: application/pdf
Relation: https://bestjournal.untad.ac.id/index.php/sciencetech/article/view/17175/11999; https://bestjournal.untad.ac.id/index.php/sciencetech/article/view/17175
-
4Academic Journal
المؤلفون: Diva Addini Maghribi Muyassiroh, Fitri Aulia Permatasari, Tomoyuki Hirano, Takashi Ogi, Ferry Iskandar
مصطلحات موضوعية: Biophysics, Marine Biology, Chemical Sciences not elsewhere classified, Physical Sciences not elsewhere classified, level information security, decrypt secret information, various synthesis parameters, suitable synthesis formulation, guiding material synthesis, assisted cd synthesis, achieve multilevel anticounterfeiting, regression ml model, ultralong phosphorescence lifetime, enhanced phosphorescence lifetime, synthesizing rtp cds, rtp cds exhibit, specific average lifetime, green emission afterglow, information encryption room, information encryption, specific lifetime, average lifetime, synthesis process, optimal lifetime, including anticounterfeiting, green emissions, blue emission, afterglow feature, produce cds, phosphorescence remains
-
5Academic Journal
المؤلفون: Snehal Samanth, Prema K V, Mamatha Balachandra
المصدر: Cogent Engineering, Vol 10, Iss 1 (2023)
مصطلحات موضوعية: Decrypt, drone, encrypt, GCS, LEA-256, panorama, Engineering (General). Civil engineering (General), TA1-2040
وصف الملف: electronic resource
Relation: https://doaj.org/toc/2331-1916
-
6
المؤلفون: Lasry, George, Megyesi, Beáta, 1971, Kopal, Nils
المصدر: Cryptologia. 45(6):479-540
مصطلحات موضوعية: cryptanalysis, CrypTool, DECRYPT project, papal ciphers, crypto tools, Computational Linguistics, Datorlingvistik
وصف الملف: electronic
-
7Academic Journal
المؤلفون: Tamus Bin Tahir, Mochammad Apriyadi, Muh Rais, Irwan Syarif
المصدر: Patria Artha Technological Journal, Vol 4, Iss 1, Pp 41-46 (2020)
مصطلحات موضوعية: encrypt dan decrypt, aes, laravel, Electronic computers. Computer science, QA75.5-76.95
وصف الملف: electronic resource
-
8Academic Journal
المؤلفون: Mark Kenneth C. Engcot
المصدر: International Journal of Recent Research in Mathematics Computer Science and Information Technology, 9(1), 28-33, (2022-08-08)
مصطلحات موضوعية: cryptography, linear Diophantine equation, encrypt, decrypt, encode, decode
-
9Academic Journal
المؤلفون: Nurdin, Alya Aulia, Djuniadi, Djuniadi
المصدر: Journal of Soft Computing Exploration; Vol. 3 No. 1 (2022): March 2022; 37-43 ; 2746-0991 ; 2746-7686 ; 10.52465/joscex.v3i1
وصف الملف: application/pdf
-
10Academic Journal
المؤلفون: Efendi, Muhammad, Volvo Sihombing, Parulian, Sahat
المصدر: Sinkron : jurnal dan penelitian teknik informatika; Vol. 6 No. 1 (2021): Article Research Volume 6 Issue 1: January 2021; 243-247 ; 2541-2019 ; 2541-044X ; 10.33395/sinkron.v7i1
وصف الملف: application/pdf
-
11Academic Journal
المؤلفون: Fitriana, Risa Naili, Djuniadi, Djuniadi
المصدر: Systemic: Information System and Informatics Journal; Vol. 7 No. 2 (2021): Desember; 1-7 ; 2548-6551 ; 2460-8092 ; 10.29080/systemic.v7i2
مصطلحات موضوعية: Data Security, Encryption, Decrypt, Advanced Encryption Standard, Rivest Cipher4, Keamanan Data, Enkripsi, Dekripsi
وصف الملف: application/pdf
Relation: http://jurnalsaintek.uinsby.ac.id/index.php/SYSTEMIC/article/view/1263/756; http://jurnalsaintek.uinsby.ac.id/index.php/SYSTEMIC/article/view/1263
-
12Academic Journal
المؤلفون: Muhammad Efendi, Volvo Sihombing, Sahat Parulian
المصدر: Sinkron, Vol 7, Iss 1, Pp 243-247 (2022)
مصطلحات موضوعية: security, base64, encrypt, decrypt, ascii, Electronics, TK7800-8360, Electronic computers. Computer science, QA75.5-76.95
Relation: https://jurnal.polgan.ac.id/index.php/sinkron/article/view/11256; https://doaj.org/toc/2541-044X; https://doaj.org/toc/2541-2019; https://doaj.org/article/f8275e6ddbab4dada4878122bd63bdb5
-
13Academic Journal
المؤلفون: Wildatunnisa Fahriah, Tulus Febrianto
المصدر: JISA (Jurnal Informatika dan Sains), Vol 2, Iss 1, Pp 1-5 (2020)
مصطلحات موضوعية: sms, encrypt, decrypt, blok cipher, blowfish, java, Information technology, T58.5-58.64, Computer software, QA76.75-76.765
وصف الملف: electronic resource
-
14Academic Journal
المؤلفون: Febriyani, Fauziyah Suwarsita, Arfriandi, Arief
المصدر: JISKA (Jurnal Informatika Sunan Kalijaga); Vol. 6 No. 3 (2021): September 2021; 171-177 ; 2528-0074 ; 2527-5836
مصطلحات موضوعية: Digital Data, Cryptography, RC4 Algorithm, Waterfall, Website, encrypt and decrypt
وصف الملف: application/pdf
Relation: https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/2461/2372; https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/2461
-
15Academic Journal
المؤلفون: manager, journal
المصدر: University of Ibadan Journal of Science and Logics in ICT Research; Vol. 4 No. 1 (2020): UIJSLICTR Vol. 4 No. 1
مصطلحات موضوعية: Cipher-text, Encode Distribution, Encode Distribution Transforming Encoder (DTE), Encrypt and Decrypt, AES, Honey Encryption
وصف الملف: application/pdf
-
16Academic Journal
المؤلفون: Fahriah, W. (Wildatunnisa), Febrianto, T. (Tulus)
المصدر: Jurnal Informatika dan Sains
وصف الملف: application/pdf
-
17Academic Journal
المؤلفون: Wang Hui, Hong Bo, Tang Junyong
المصدر: International Journal of Advanced Network, Monitoring, and Controls, Vol 3, Iss 2 (2018)
مصطلحات موضوعية: Cloud Storage, Re-encryption, Decrypt, Reliability, Computer engineering. Computer hardware, TK7885-7895, Electronic computers. Computer science, QA75.5-76.95
Relation: https://www.exeley.com/exeley/journals/international_journal_advanced_network_monitoring_controls/3/2/pdf/10.21307_ijanmc-2018-046.pdf; https://doaj.org/toc/2470-8038; https://doaj.org/article/edb484e2d0404b92a66d817200fcf39c
-
18Academic Journal
المؤلفون: Mohurle, Savita, Patil, Manisha
المصدر: International Journal of Advanced Research in Computer Science; Vol 8, No 5 (2017): May-June 2017; 1938-1940 ; 0976-5697 ; 10.26483/ijarcs.v8i5
مصطلحات موضوعية: Ransomware, Wannacry, encrypt, decrypt, preventive measures, threat, security
وصف الملف: application/pdf
Relation: http://www.ijarcs.info/index.php/Ijarcs/article/view/4021/3642; http://www.ijarcs.info/index.php/Ijarcs/article/view/4021
-
19Dissertation/ Thesis
المؤلفون: Milioni, Nikolina
مصطلحات موضوعية: Ciphers, Automatic Transcription, Decrypt project, Few-shot learning, Language Technology (Computational Linguistics), Språkteknologi (språkvetenskaplig databehandling)
وصف الملف: application/pdf
-
20Academic Journal
المؤلفون: Lee, Cheng-Chi, Chen, Shun-Der, Chen, Chin-Ling
المصدر: Applied Mathematics & Information Sciences
مصطلحات موضوعية: Authentication, key exchange, password, password guessing attacks, three-party encrypted key exchange. 1. Introduction In Internet, two communicating parties can communicate each other securely by using conventional symmetric-key cryptosystems such as the AES [19]. The two parties have a common session key to encrypt and decrypt their communicated messages by using symmetric-key cryptosystem. However, how do two parties securely obtain the common session key between them? This can be solved by using Diffie-Hellman key exchange protocol [7]. In 1992, Bellovin and Merritt firstly proposed an encrypted key exchange (EKE) family of key exchange protocols [2]. It is a password-based authentication and key agreement protocol. Two advantages of EKE are: (1) the communicating parties can use an easy-to-remember password to authenticate each other without being threatened by dictionary attacks [17], (2) the communicating parties can share a common session key to encrypt and decrypt confidential messages. In a large communication environment, EKE is unpractical because every two parties should share a password previously. If there are one thousand parties to communicate in this environment, each party should hold 999 passwords for EKE. Hence, an extension to EKE is proposed to enhance its practicality. The extension is called three-party encrypted key exchange protocol (3PEKE) in which a participant is allowed to share only one easy-toremember password with a trusted server such that two participants can negotiate a common session key to communicate with each other secretly [3, 10]. It can provide confidential communications between two participants over an insecure network. In 3PEKE, each party only holds himself/herself password. 1.1. Related Work Since the 3PEKE is based on password authentication, protecting the low-entropy password from guessing attacks is crucial for password-based authentication schemes [15, 23]. Ding and Horster introduced three possible types of guessing attacks as follows: (1) detectable on-line password guessing attacks, (2) undetectable on-line password guessing attacks, and (3) off-line password guessing attacks. Among the three classes, off-line password guessing attacks is the most critical ones [8]. The proposed 3PEKE ¤ Corresponding author: e-mail: ryanchen@lins.fju.edu.tw c° 2012 NSP Natural Sciences Publishing Cor.
Time: 5
وصف الملف: application/pdf
Relation: https://digitalcommons.aaru.edu.jo/amis/vol06/iss3/27; https://digitalcommons.aaru.edu.jo/cgi/viewcontent.cgi?article=1078&context=amis