Results 91 to 100 of about 59,589 (271)

Securing the Road Ahead: A Survey on Internet of Vehicles Security Powered by a Conceptual Blockchain‐Based Intrusion Detection System for Smart Cities

open access: yesTransactions on Emerging Telecommunications Technologies, Volume 36, Issue 4, April 2025.
Security is a crucial factor for information systems and other vital infrastructures. Ensuring robust security measures is imperative due to the substantial volume of network traffic. On the other side, many network components are susceptible to cyber threats and attacks owing to their inherent properties.
Fatima Al‐Quayed   +5 more
wiley   +1 more source

On Decoding Schemes for the MDPC-McEliece Cryptosystem [PDF]

open access: yes, 2018
Recently, it has been shown how McEliece public-key cryptosystems based on moderate-density parity-check (MDPC) codes allow for very compact keys compared to variants based on other code families. In this paper, classical (iterative) decoding schemes for
Bartz, Hannes, Liva, Gianluigi
core   +1 more source

Implementation Security in Quantum Key Distribution

open access: yesAdvanced Quantum Technologies, Volume 8, Issue 2, February 2025.
The problem of implementation security in quantum key distribution (QKD) refers to the difficulty of meeting the requirements of mathematical security proofs in real‐life QKD systems. The present work provides a succint review on this topic, focusing on discrete‐variable QKD setups.
Víctor Zapatero   +2 more
wiley   +1 more source

FPGA-based Chaotic Cryptosystem by Using Voice Recognition as Access Key

open access: yesElectronics, 2018
A new embedded chaotic cryptosystem is introduced herein with the aim to encrypt digital images and performing speech recognition as an external access key. The proposed cryptosystem consists of three technologies: (i) a Spartan 3E-1600 FPGA from Xilinx;
E. Rodríguez-Orozco   +6 more
semanticscholar   +1 more source

On the security of compressed encryption with partial unitary sensing matrices embedding a secret keystream

open access: yesEURASIP Journal on Advances in Signal Processing, 2017
The principle of compressed sensing (CS) can be applied in a cryptosystem by providing the notion of security. In this paper, we study the computational security of a CS-based cryptosystem that encrypts a plaintext with a partial unitary sensing matrix ...
Nam Yul Yu
doaj   +1 more source

Enabling Quantum Privacy and Security by Design: Imperatives for Contemporary State‐of‐the‐Art in Quantum Software Engineering

open access: yesJournal of Software: Evolution and Process, Volume 37, Issue 2, February 2025.
ABSTRACT With the advent of Quantum Computing and its exponential research endeavors in the past couple of decades, we are looking at a Golden Era of Quantum Computing. We are transitioning into an age of Hybrid Classical‐Quantum Computers, where the quantum computational resources are selectively harnessed for resource‐intensive tasks. On the one hand,
Vita Santa Barletta   +4 more
wiley   +1 more source

Securing Mobile Healthcare Data: A Smart Card Based Cancelable Finger-Vein Bio-Cryptosystem

open access: yesIEEE Access, 2018
Most existing biometric systems designed for healthcare applications only use biometrics for authentication/access control without considering its other function—data encryption.
Wencheng Yang   +6 more
semanticscholar   +1 more source

Application of Algorithms on Lattices in Post-Quantum Cryptography

open access: yesСовременные информационные технологии и IT-образование
The article analyzes approaches to the development of post-quantum algorithms, reviews progress in the field of quantum computers and post-quantum cryptographic encryption systems. One of the most promising approaches is considered, which is based on the
Nikolai Urban, Elena Melnikova
doaj   +1 more source

Design and parallel implementation on Artix-7 FPGA of the SIMON32/64 Cryptosystem

open access: yesVisión Electrónica, 2022
In the rise of digital transformation, information security is positioned in a prominent place because it provides confidence to society in the use of information technologies. For this reason, there is growing research in this area.
José Gabriel Rincón-González   +2 more
doaj  

A Brief Retrospective Look at the Cayley-Purser Public-key Cryptosystem, 19 Years Later [PDF]

open access: yes, 2018
The purpose of this paper is to describe and analyze the Cayley-Purser algorithm, which is a public-key cryptosystem proposed by Flannery in 1999. I will present two attacks on it, one of which is apparently new.
Stinson, Douglas R.
core   +1 more source

Home - About - Disclaimer - Privacy