Results 91 to 100 of about 59,589 (271)
Security is a crucial factor for information systems and other vital infrastructures. Ensuring robust security measures is imperative due to the substantial volume of network traffic. On the other side, many network components are susceptible to cyber threats and attacks owing to their inherent properties.
Fatima Al‐Quayed+5 more
wiley +1 more source
On Decoding Schemes for the MDPC-McEliece Cryptosystem [PDF]
Recently, it has been shown how McEliece public-key cryptosystems based on moderate-density parity-check (MDPC) codes allow for very compact keys compared to variants based on other code families. In this paper, classical (iterative) decoding schemes for
Bartz, Hannes, Liva, Gianluigi
core +1 more source
Implementation Security in Quantum Key Distribution
The problem of implementation security in quantum key distribution (QKD) refers to the difficulty of meeting the requirements of mathematical security proofs in real‐life QKD systems. The present work provides a succint review on this topic, focusing on discrete‐variable QKD setups.
Víctor Zapatero+2 more
wiley +1 more source
FPGA-based Chaotic Cryptosystem by Using Voice Recognition as Access Key
A new embedded chaotic cryptosystem is introduced herein with the aim to encrypt digital images and performing speech recognition as an external access key. The proposed cryptosystem consists of three technologies: (i) a Spartan 3E-1600 FPGA from Xilinx;
E. Rodríguez-Orozco+6 more
semanticscholar +1 more source
The principle of compressed sensing (CS) can be applied in a cryptosystem by providing the notion of security. In this paper, we study the computational security of a CS-based cryptosystem that encrypts a plaintext with a partial unitary sensing matrix ...
Nam Yul Yu
doaj +1 more source
ABSTRACT With the advent of Quantum Computing and its exponential research endeavors in the past couple of decades, we are looking at a Golden Era of Quantum Computing. We are transitioning into an age of Hybrid Classical‐Quantum Computers, where the quantum computational resources are selectively harnessed for resource‐intensive tasks. On the one hand,
Vita Santa Barletta+4 more
wiley +1 more source
Securing Mobile Healthcare Data: A Smart Card Based Cancelable Finger-Vein Bio-Cryptosystem
Most existing biometric systems designed for healthcare applications only use biometrics for authentication/access control without considering its other function—data encryption.
Wencheng Yang+6 more
semanticscholar +1 more source
Application of Algorithms on Lattices in Post-Quantum Cryptography
The article analyzes approaches to the development of post-quantum algorithms, reviews progress in the field of quantum computers and post-quantum cryptographic encryption systems. One of the most promising approaches is considered, which is based on the
Nikolai Urban, Elena Melnikova
doaj +1 more source
Design and parallel implementation on Artix-7 FPGA of the SIMON32/64 Cryptosystem
In the rise of digital transformation, information security is positioned in a prominent place because it provides confidence to society in the use of information technologies. For this reason, there is growing research in this area.
José Gabriel Rincón-González+2 more
doaj
A Brief Retrospective Look at the Cayley-Purser Public-key Cryptosystem, 19 Years Later [PDF]
The purpose of this paper is to describe and analyze the Cayley-Purser algorithm, which is a public-key cryptosystem proposed by Flannery in 1999. I will present two attacks on it, one of which is apparently new.
Stinson, Douglas R.
core +1 more source