decryptor statistics

info info

Citations per year

Number of citations per year for the bioinformatics software tool decryptor

Tool usage distribution map

This map represents all the scientific publications referring to decryptor per scientific context
info info

Associated diseases


Popular tool citations

chevron_left Protein inference chevron_right
Want to access the full stats & trends on this tool?

decryptor specifications


Unique identifier OMICS_16582
Name decryptor
Interface Web user interface
Restrictions to use None
Computer skills Basic
Version 1.1
Stability Stable
Maintained Yes


  • person_outline Miroslav Hruska

Additional information

A registration is needed to access to tools.

decryptor citations


Multicomponent reactions provide key molecules for secret communication

Nat Commun
PMCID: 5897361
PMID: 29651145
DOI: 10.1038/s41467-018-03784-x

[…] ption Standard (AES, also known as Rijndael), Serpent, or Blowfish can protect data reliably, but require a secret key for their operation. This secret key must be known by both the encryptor and the decryptor, and should be chosen uniformly at random. Typically, secret keys are short (e.g., 128 bits), but it is not a priori clear how encryptor and decryptor receive common secret keys. Popular met […]


Feasibility of a web based suicide awareness programme for Asian American college students

BMJ Open
PMCID: 5223721
PMID: 28003296
DOI: 10.1136/bmjopen-2016-013466

[…] tured Query Language (SQL) Server 2000 database hosted by the university for automatic data collection, and only secure connection was allowed. The unique identifiers were encrypted, and there was no decryptor available. Therefore, the data were coded but anonymous. Data were exported to an Excel file to facilitate data analysis in SPSS V.22.0 and STATA V.13.0. Group differences on demographic cha […]


CP ABE Based Privacy Preserving User Profile Matching in Mobile Social Networks

PLoS One
PMCID: 4919042
PMID: 27337001
DOI: 10.1371/journal.pone.0157933

[…] e M ∈ GT, the encryptor chooses s∈RZp*, then computes C^,C0,C1 as follows: C^=M·Ys,C0=gs,C1=(f∏aij∈WΨij)s. The algorithm outputs the ciphertext CT={C^,C0,C1}.Decrypt(PK, CT, SK): In this algorithm, a decryptor computes M=C^e(C1,D0)/e(C0,D1) (This computation is based on the original KeyGeneration algorithm. If the input parameter is SKcan, the ciphertext is computed as CT=C^e(C1,D0)/e(C0,Dcan)). I […]


Service Oriented Security Framework for Remote Medical Services in the Internet of Things Environment

Healthc Inform Res
PMCID: 4659885
PMID: 26618034
DOI: 10.4258/hir.2015.21.4.271

[…] vice Management), Data Mgr (Data Management), Resource Mgr (Resource Management), and System Clock manage and supply service, data, resource, and time data regarding the application service. The A_En/Decryptor encrypts (or decrypts) the data received from the A_Communicator. The A_Communicator receives the data from the P_Communicator, and then the data is forwarded to the second access controller […]

Want to access the full list of citations?
decryptor institution(s)
Institute of molecular and translational medicine, Faculty of Medicine and Dentistry, Palacky University Olomouc, Olomouc, Czech Republic
decryptor funding source(s)
This work was supported by ELIXIR CZ research infrastructure project (MEYS Grant No: LM2015047).

decryptor reviews

star_border star_border star_border star_border star_border
star star star star star

Be the first to review decryptor