A novel hybrid medical image encryption scheme based on memristive chaos and DNA-ARX-3DES with Real-Time implementation. [PDF]
Suzgen EE, Sahin ME, Ulutas H.
europepmc +1 more source
Toward owner governance in genomic data privacy with Governome. [PDF]
Zhang J +8 more
europepmc +1 more source
Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs. [PDF]
Janakiraman S +5 more
europepmc +1 more source
Performance Evaluation of ChaosFortress Lightweight Cryptographic Algorithm for Data Security in Water and Other Utility Management. [PDF]
Raphael R +3 more
europepmc +1 more source
Design and analysis of a secure image encryption algorithm using proposed non-linear RN chaotic system and ECC/HKDF key derivation with authentication support. [PDF]
Zhiqiang H +5 more
europepmc +1 more source
Pixel-Level and DNA-Level Image Encryption Method Based on Five-Dimensional Hyperchaotic System. [PDF]
Zhou M, Li X, Du W, Li J, Wei Z.
europepmc +1 more source
Omega deoxyribonucleic acid cryptography key-based authentication. [PDF]
Chuah CW, Tey J, Mohamad KM.
europepmc +1 more source
Light weight encryption technique: a cellular automaton based approach for securing health records. [PDF]
Anwar S, Pranav P, Kamilya S.
europepmc +1 more source
Related searches:
Linear Frameworks for Block Ciphers
Designs, Codes and Cryptography, 2001In the paper linear components in (block) cipher structures are investigated, especially with respect to their role in providing resistance against differential and linear cryptanalysis. The cipher structures studied are similar to the classical Substitution-Permutation networks, however instead of permutations more general linear transformations are ...
Daemen, Joan +2 more
openaire +2 more sources
Threshold cryptosystems use algebraic properties such as homomorphisms in order to allow several parties to jointly evaluate a cryptographic primitive. Several cryptographic primitives, however, avoid -by definition- the use of algebraic properties, or otherwise their security is compromised; this is the case, for instance, of block ciphers, pseudo ...
Ernie Brickell +2 more
openaire +1 more source

