Results 11 to 20 of about 37,139 (180)
Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols
Kleptography is the study of pilfering secure data secretly and subliminally. The concept of inserting backdoors was introduced two decades ago by Young and Yung. However, still it is a serious threat for modern cryptography.
Anum Sajjad +5 more
doaj +1 more source
Composite cellular automata based encryption method applied to surveillance videos
This work is part of the research project “Encryption Models Based on Chaotic Attractors” institutionalized in the Research and Scientific Development Center of the Universidad Distrital Francisco José de Caldas.
Luis Miguel Cortés Martinez +2 more
doaj +1 more source
Encryption using semigroup action
Anencipheringtransformationisafunctionf thatconvertsanyplaintext message into a ciphertext message and deciphering transformation is a function f−1, which reverse the process. Such a set-up is calledacryptosystem. Inthispaper,weextendageneralizationofthe
Indira Devi Anooja +2 more
doaj +1 more source
Quantum Cryptography Based on the Time--Energy Uncertainty Relation [PDF]
A new cryptosystem based on the fundamental time--energy uncertainty relation is proposed. Such a cryptosystem can be implemented with both correlated photon pairs and single photon states.Comment: 5 pages, LaTex, no ...
A. K. Ekert +23 more
core +2 more sources
A lightweight McEliece cryptosystem co-processor design [PDF]
Due to the rapid advances in the development of quantum computers and their susceptibility to errors, there is a renewed interest in error correction algorithms.
Agrawal, Rashmi +3 more
core +2 more sources
Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT
In recent years, the Internet of Things (IoT) has found wide application and attracted much attention. Since most of the end-terminals in IoT have limited capabilities for storage and computing, it has become a trend to outsource the data from local to ...
Hongyang Yan +3 more
doaj +1 more source
Generalized Fibonacci Sequences for Elliptic Curve Cryptography
The Fibonacci sequence is a well-known sequence of numbers with numerous applications in mathematics, computer science, and other fields. In recent years, there has been growing interest in studying Fibonacci-like sequences on elliptic curves.
Zakariae Cheddour +2 more
doaj +1 more source
A Quantum Chaotic Image Cryptosystem and Its Application in IoT Secure Communication
In the Internet of Things environment, the secure transmission of digital images has attracted much attention. To improve the confidentiality, we propose an image cryptosystem adopting a quantum chaotic map and the certain security-enhanced mechanisms ...
Heping Wen +9 more
doaj +1 more source
Models of interaction of cryptography and chaotic dynamics
Cryptography deals with the problem of information protection by its transformation, providing the protection of information (by means of computational techniques), i.e. a set of agreed encryptian tools.
B.K. Shayakhmetova +3 more
doaj +1 more source
Security analysis and enhancements of an image cryptosystem based on hyperchaotic system
The security system engaged to transfer securely the sensitive information over wireless channels must posses some innate features such as high resistivity to various cryptographic attacks, high sensitivity to secret key and plaintext, and strong ...
Musheer Ahmad +2 more
doaj +1 more source

