A multi-image codebook approach for secure text transmission. [PDF]
Rashid OF, Tuama SA, Al-Shahwani H.
europepmc +1 more source
Code-based cryptography: A superficial introduction
This thesis provides an overview of some known post-quantum cryptography schemes with special attention given to code-based schemes. It also discusses some challenges that may arise trying to implement a McEliece-like cryptosystem. The last part of the thesis examines the code-based submissions to NIST's post-quantum cryptography standardization ...
openaire +1 more source
Empowering IoV Security: A Novel Secure Cryptographic Algorithm (OpCKEE) for Network Protection in Connected Vehicles. [PDF]
Ebadinezhad S, Nlend Bayemi PF.
europepmc +1 more source
A multi-layered cryptographic trust reinforcement model against AI-driven threat propagation and zero-day cloud vulnerabilities in healthcare data ecosystems. [PDF]
Rani M +5 more
europepmc +1 more source
Implementational aspects of code-based cryptography
We present the implementation details of Hybrid McEliece Encryption Scheme (HyMES), a improved version of the original McEliece scheme developed with Nicolas Sendrier. We present a modified version of the original scheme (which we call hybrid). It has two modifications, the first increases the information rate by putting some data in the error pattern.
openaire +1 more source
SRAM based Gaussian noise generation for post quantum cryptography. [PDF]
Kim MS, Jeon SB, Kim S.
europepmc +1 more source
A Post-Quantum Secure RFID Authentication Protocol Based on NTRU Encryption Algorithm. [PDF]
Liu H, Wu H, Ge N, Dong Q.
europepmc +1 more source
Dynamic structure driven image scrambling technique for data protection. [PDF]
Shee SK, Khandelwal J, Bairwa AK.
europepmc +1 more source
Enhancing the LEACH protocol and lightweight chaotic cryptography for secure data transmission in wireless sensor networks. [PDF]
Zarei M +3 more
europepmc +1 more source
WAWA: Wavelet Analysis-Based Watermarking Authentication for GNSS Civil Signal with Immediate Symbol-Level Verification. [PDF]
Tang X, Tang X, Lin H, Wu Y, Sun G.
europepmc +1 more source

