Results 11 to 20 of about 37,139 (180)

Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols

open access: yesIEEE Access, 2020
Kleptography is the study of pilfering secure data secretly and subliminally. The concept of inserting backdoors was introduced two decades ago by Young and Yung. However, still it is a serious threat for modern cryptography.
Anum Sajjad   +5 more
doaj   +1 more source

Composite cellular automata based encryption method applied to surveillance videos

open access: yesDyna, 2020
This work is part of the research project “Encryption Models Based on Chaotic Attractors” institutionalized in the Research and Scientific Development Center of the Universidad Distrital Francisco José de Caldas.
Luis Miguel Cortés Martinez   +2 more
doaj   +1 more source

Encryption using semigroup action

open access: yesRatio Mathematica, 2021
Anencipheringtransformationisafunctionf thatconvertsanyplaintext message into a ciphertext message and deciphering transformation is a function f−1, which reverse the process. Such a set-up is calledacryptosystem. Inthispaper,weextendageneralizationofthe
Indira Devi Anooja   +2 more
doaj   +1 more source

Quantum Cryptography Based on the Time--Energy Uncertainty Relation [PDF]

open access: yes, 1996
A new cryptosystem based on the fundamental time--energy uncertainty relation is proposed. Such a cryptosystem can be implemented with both correlated photon pairs and single photon states.Comment: 5 pages, LaTex, no ...
A. K. Ekert   +23 more
core   +2 more sources

A lightweight McEliece cryptosystem co-processor design [PDF]

open access: yes, 2020
Due to the rapid advances in the development of quantum computers and their susceptibility to errors, there is a renewed interest in error correction algorithms.
Agrawal, Rashmi   +3 more
core   +2 more sources

Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT

open access: yesSensors, 2018
In recent years, the Internet of Things (IoT) has found wide application and attracted much attention. Since most of the end-terminals in IoT have limited capabilities for storage and computing, it has become a trend to outsource the data from local to ...
Hongyang Yan   +3 more
doaj   +1 more source

Generalized Fibonacci Sequences for Elliptic Curve Cryptography

open access: yesMathematics, 2023
The Fibonacci sequence is a well-known sequence of numbers with numerous applications in mathematics, computer science, and other fields. In recent years, there has been growing interest in studying Fibonacci-like sequences on elliptic curves.
Zakariae Cheddour   +2 more
doaj   +1 more source

A Quantum Chaotic Image Cryptosystem and Its Application in IoT Secure Communication

open access: yesIEEE Access, 2021
In the Internet of Things environment, the secure transmission of digital images has attracted much attention. To improve the confidentiality, we propose an image cryptosystem adopting a quantum chaotic map and the certain security-enhanced mechanisms ...
Heping Wen   +9 more
doaj   +1 more source

Models of interaction of cryptography and chaotic dynamics

open access: yesҚарағанды университетінің хабаршысы. Математика сериясы, 2019
Cryptography deals with the problem of information protection by its transformation, providing the protection of information (by means of computational techniques), i.e. a set of agreed encryptian tools.
B.K. Shayakhmetova   +3 more
doaj   +1 more source

Security analysis and enhancements of an image cryptosystem based on hyperchaotic system

open access: yesJournal of King Saud University: Computer and Information Sciences, 2021
The security system engaged to transfer securely the sensitive information over wireless channels must posses some innate features such as high resistivity to various cryptographic attacks, high sensitivity to secret key and plaintext, and strong ...
Musheer Ahmad   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy