Results 1 to 10 of about 11,118 (170)
Software implementation of systematic polar encoding based PKC-SPE cryptosystem for quantum cybersecurity [PDF]
The ever-growing threats in cybersecurity growing with the rapid development of quantum computing, necessitates the development of robust and quantum-resistant cryptographic systems.
Ritu Redhu+5 more
doaj +2 more sources
Quantum Public-Key Cryptosystem Based on Classical NP-Complete Problem [PDF]
We present a quantum public-key cryptosystem based on a classical NP-complete problem related with finding a code word of a given weight in a linear binary code.
Li Yang
arxiv +3 more sources
On Enhancing Security for Division Homomorphism with ElGamal
Secure auctions and machine learning in cloud increasingly employs multi-party and homomorphic encryption support. A modification to Elgamal public key cryptosystem was shown to enable homomorphic division using an encoding of plaintext as fractions with
Marius Silaghi, Ameerah Alsulami
doaj +1 more source
Detecting the Security Level of Various Cryptosystems Using Machine Learning Models
With recent advancements in multimedia technologies, the security of digital data has become a critical issue. To overcome the vulnerabilities of current security protocols, researchers tend to focus their efforts on modifying existing protocols.
Arslan Shafique+5 more
doaj +1 more source
Image Encryption Scheme Based on Orbital Shift Pixels Shuffling with ILM Chaotic System
Image encryption techniques protect private images from unauthorized access while they are being transmitted. Previously used confusion and diffusion processes are risky and time-consuming.
Wajid Ali+4 more
doaj +1 more source
Digital Technologies for Managing Accounting and Control Information in Large and Small Ecosystems
The article is devoted to the study of the paradigm of accounting, control and analytical information that affects the success of business processes in the corporate and state sectors of the economy. The authors propose the step-bystep development of the
М. T. Turmanov, T. М. Rogulenko
doaj +1 more source
Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols
Kleptography is the study of pilfering secure data secretly and subliminally. The concept of inserting backdoors was introduced two decades ago by Young and Yung. However, still it is a serious threat for modern cryptography.
Anum Sajjad+5 more
doaj +1 more source
The growth of internet era leads to a major transformation in a storage of data and accessing the applications. One such new trend that promises the endurance is the Cloud computing. Computing resources offered by the Cloud includes the servers, networks,
Debabrata Samanta+6 more
doaj +1 more source
Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions
Cryptography has been used from time immemorial for preserving the confidentiality of data/information in storage or transit. Thus, cryptography research has also been evolving from the classical Caesar cipher to the modern cryptosystems, based on ...
Chithralekha Balamurugan+3 more
doaj +1 more source
In order to ensure reliable and secure image exchange, chaotic systems are often considered for their good performance in information security. In this work, we first propose an extended version of a chaotic tent map (TM)—the multiparametric 1D tent map (
Achraf Daoui+4 more
doaj +1 more source