Results 11 to 20 of about 69,698 (279)

Privacy Protection of Digital Images Using Watermarking and QR Code-based Visual Cryptography

open access: yesAdvances in Multimedia, 2023
The increase in information sharing in terms of digital images imposes threats to privacy and personal identity. Digital images can be stolen while in transfer and any kind of alteration can be done very easily. Thus, privacy protection of digital images
Akanksha Arora   +2 more
doaj   +1 more source

Modified pqsigRM: RM Code-Based Signature Scheme

open access: yesIEEE Access, 2020
We present a novel code-based signature scheme called modified pqsigRM. This scheme is based on a modified Reed-Muller (RM) code, which reduces the signing complexity and key size compared with existing code-based signature schemes.
Yongwoo Lee   +3 more
doaj   +1 more source

Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions

open access: yesApplied Sciences, 2021
Lattice and code cryptography can replace existing schemes such as elliptic curve cryptography because of their resistance to quantum computers. In support of public key infrastructures, the distribution, validation and storage of the cryptographic keys ...
Bertrand Cambou   +8 more
doaj   +1 more source

Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals [PDF]

open access: yesJournal of Artificial Intelligence and Data Mining, 2020
Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography
M. Zeynali   +2 more
doaj   +1 more source

A Mathematical Perspective on Post-Quantum Cryptography

open access: yesMathematics, 2022
In 2016, the National Institute of Standards and Technology (NIST) announced an open competition with the goal of finding and standardizing suitable algorithms for quantum-resistant cryptography.
Maximilian Richter   +3 more
doaj   +1 more source

Multidomain Network Based on Programmable Networks: Security Architecture [PDF]

open access: yes, 2005
This paper proposes a generic security architecture designed for a multidomain and multiservice network based on programmable networks. The multiservice network allows users of an IP network to run programmable services using programmable nodes ...
Alarcos, Bernardo   +2 more
core   +2 more sources

MATHEMATICAL MODELS OF HYBRID CRYPTO CODE CONSTRUCTIONS ON DAMAGED CODES

open access: yesСучасні інформаційні системи, 2019
The subject are mathematical models of building hybrid (complex) cryptosystems based on Mac-Elis crypto-code constructions on damaged codes. The purpose of this work is cryptographic mechanisms design in post-quantum cryptography to provide basic ...
Serhii Yevseiev   +2 more
doaj   +1 more source

Review on DNA Cryptography [PDF]

open access: yes, 2019
Cryptography is the science that secures data and communication over the network by applying mathematics and logic to design strong encryption methods.
Mondal, Mandrita, Ray, Kumar S.
core   +3 more sources

Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages

open access: yesApplied Sciences, 2020
Beginning with the proposal of the McEliece cryptosystem in 1978, code-based cryptography has positioned itself as one of main categories in post-quantum cryptography (PQC).
ByeongGyu Park   +4 more
doaj   +1 more source

Research Status, Challenges, and Future Development of Post-Quantum Cryptography [PDF]

open access: yes中国工程科学
As an important strategic resource for safeguarding national information security and the healthy development of digital economy, cryptography is the cornerstone of protecting the security of critical infrastructure, government affairs data, financial ...
Guizhen Zhu   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy