Results 41 to 50 of about 124 (57)

Using shifted conjugacy in braid-based cryptography

open access: yes, 2006
Conjugacy is not the only possible primitive for designing braid-based protocols. To illustrate this principle, we describe a Fiat--Shamir-style authentication protocol that be can be implemented using any binary operation that satisfies the left self ...
Dehornoy, Patrick
core   +1 more source

Color image encryption and decryption using Hill Cipher associated with Arnold transform [PDF]

open access: yes, 2016
Image security over open network transmission is a big concern nowadays. This paper proposes another methodology for color image encoding and decoding using two stage Hill Cipher method which is connected with Arnold Transformation.
Hanmandlu, M.   +2 more
core   +1 more source

Encryption of Color Images Based on Chaotic Attractors Generated by ODE Systems Containing Module Nonlinearities [PDF]

open access: yes
The main objective of this work is to construct an algorithm for modeling chaotic attractors using special neural ODEs with antisymmetric matrices (antisymmetric neural ODEs) and modular power nonlinearities.
Belozyorov, Vasiliy Ye.   +2 more
core   +2 more sources

Homoclinic and Heteroclinic Neural ODEs: Theory and Its Use to Construct New Chaotic Attractors [PDF]

open access: yes
New types of neural ordinary differential equations (NODE) with power nonlinearities are considered. For these NODE systems, new conditions for the existence of homoclinic and heteroclinic orbits are found.
Belozyorov, Vasiliy Ye.   +2 more
core   +2 more sources

Using Circle Map for Audio Encryption Algorithm [PDF]

open access: yes, 2017
In this paper we propose audio encryption algorithm based on standard circle map. The proposed scheme contains bit level sample permutation using pseudorandom generator.
Bonchev, Lachezar, Kordov, Krasimir
core   +1 more source

Cryptographycal protocols in the Egerfood Information System [PDF]

open access: yes
In this article we present the cryptography of the food safety tracking sys- tem of the Regional Knowledge Center (EGERFOOD), which can be found in Eger, Hungary at the Eszterházy Károly College.
Kusper, Gábor   +2 more
core  

Analysing and exploiting the Mantin biases in RC4. [PDF]

open access: yesDes Codes Cryptogr, 2018
Bricout R   +3 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy