Results 11 to 20 of about 35,576 (230)
In this paper we describe a new cryptosystem we call "The Hush Cryptosystem" for hiding encrypted data in innocent Arabic sentences. The main purpose of this cryptosystem is to fool observer-supporting software into thinking that the encrypted data is not encrypted at all.
Hussein, Sari Haj
openaire +4 more sources
Variations of the McEliece Cryptosystem [PDF]
Two variations of the McEliece cryptosystem are presented. The first one is based on a relaxation of the column permutation in the classical McEliece scrambling process. This is done in such a way that the Hamming weight of the error, added in the encryption process, can be controlled so that efficient decryption remains possible.
Bolkema, Jessalyn+5 more
openaire +4 more sources
Adaptive DNA Cryptography With Intelligent Machine Learning for Cloud Data Defense
With the exponential growth of sensitive data generated and stored in cloud environments, traditional cryptographic techniques are increasingly strained in addressing emerging security threats.
Animesh Kairi+4 more
doaj +2 more sources
On Enhancing Security for Division Homomorphism with ElGamal
Secure auctions and machine learning in cloud increasingly employs multi-party and homomorphic encryption support. A modification to Elgamal public key cryptosystem was shown to enable homomorphic division using an encoding of plaintext as fractions with
Marius Silaghi, Ameerah Alsulami
doaj +1 more source
On the Performance of Hyperelliptic Cryptosystems [PDF]
In this paper we discuss various aspects of cryptosystems based on hyperelliptic curves. In particular we cover the implementation of the group law on such curves and how to generate suitable curves for use in cryptography. This paper presents a practical comparison between the performance of elliptic curve based digital signature schemes and schemes ...
Nigel P. Smart
openalex +3 more sources
Detecting the Security Level of Various Cryptosystems Using Machine Learning Models
With recent advancements in multimedia technologies, the security of digital data has become a critical issue. To overcome the vulnerabilities of current security protocols, researchers tend to focus their efforts on modifying existing protocols.
Arslan Shafique+5 more
doaj +1 more source
Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley +1 more source
Image Encryption Scheme Based on Orbital Shift Pixels Shuffling with ILM Chaotic System
Image encryption techniques protect private images from unauthorized access while they are being transmitted. Previously used confusion and diffusion processes are risky and time-consuming.
Wajid Ali+4 more
doaj +1 more source
Digital Technologies for Managing Accounting and Control Information in Large and Small Ecosystems
The article is devoted to the study of the paradigm of accounting, control and analytical information that affects the success of business processes in the corporate and state sectors of the economy. The authors propose the step-bystep development of the
М. T. Turmanov, T. М. Rogulenko
doaj +1 more source
Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols
Kleptography is the study of pilfering secure data secretly and subliminally. The concept of inserting backdoors was introduced two decades ago by Young and Yung. However, still it is a serious threat for modern cryptography.
Anum Sajjad+5 more
doaj +1 more source