Results 11 to 20 of about 2,385 (165)

Software implementation of systematic polar encoding based PKC-SPE cryptosystem for quantum cybersecurity [PDF]

open access: yesScientific Reports
The ever-growing threats in cybersecurity growing with the rapid development of quantum computing, necessitates the development of robust and quantum-resistant cryptographic systems.
Ritu Redhu   +5 more
doaj   +2 more sources

On Enhancing Security for Division Homomorphism with ElGamal

open access: yesProceedings of the International Florida Artificial Intelligence Research Society Conference, 2023
Secure auctions and machine learning in cloud increasingly employs multi-party and homomorphic encryption support. A modification to Elgamal public key cryptosystem was shown to enable homomorphic division using an encoding of plaintext as fractions with
Marius Silaghi, Ameerah Alsulami
doaj   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Image Encryption Scheme Based on Orbital Shift Pixels Shuffling with ILM Chaotic System

open access: yesEntropy, 2023
Image encryption techniques protect private images from unauthorized access while they are being transmitted. Previously used confusion and diffusion processes are risky and time-consuming.
Wajid Ali   +4 more
doaj   +1 more source

Detecting the Security Level of Various Cryptosystems Using Machine Learning Models

open access: yesIEEE Access, 2021
With recent advancements in multimedia technologies, the security of digital data has become a critical issue. To overcome the vulnerabilities of current security protocols, researchers tend to focus their efforts on modifying existing protocols.
Arslan Shafique   +5 more
doaj   +1 more source

A New Attack on NTRU Public Key Cryptosystem Depend on Using Public Key and Public Information [PDF]

open access: yesEngineering and Technology Journal, 2010
This paper proposed a new method to attack the NTRU cryptosystem [Hof00a,Hof98b]. It tried to exploit the public information about the parameters of NTRUcryptosystem and using the public key, to recover the private keys without delvingin the detail of ...
Abdul Monem S.Rahma   +1 more
doaj   +1 more source

Digital Technologies for Managing Accounting and Control Information in Large and Small Ecosystems

open access: yesУчёт. Анализ. Аудит, 2022
The article is devoted to the study of the paradigm of accounting, control and analytical information that affects the success of business processes in the corporate and state sectors of the economy. The authors propose the step-bystep development of the
М. T. Turmanov, T. М. Rogulenko
doaj   +1 more source

Urea-Formaldehyde Resin Confined Silicon Nanodots Composites: High-Performance and Ultralong Persistent Luminescence for Dynamic AI Information Encryption. [PDF]

open access: yesAdv Sci (Weinh)
Schematic illustration of SiNDs composite materials synthesis and its internal photophysical process mechanism. And an AI‐assisted dynamic information encryption process. ABSTRACT Persistent luminescence materials typically encounter an intrinsic trade‐off between high phosphorescence quantum yield (PhQY) and ultralong phosphorescence lifetime.
Liu Y   +9 more
europepmc   +2 more sources

Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols

open access: yesIEEE Access, 2020
Kleptography is the study of pilfering secure data secretly and subliminally. The concept of inserting backdoors was introduced two decades ago by Young and Yung. However, still it is a serious threat for modern cryptography.
Anum Sajjad   +5 more
doaj   +1 more source

A Quantum Chaotic Image Cryptosystem and Its Application in IoT Secure Communication

open access: yesIEEE Access, 2021
In the Internet of Things environment, the secure transmission of digital images has attracted much attention. To improve the confidentiality, we propose an image cryptosystem adopting a quantum chaotic map and the certain security-enhanced mechanisms ...
Heping Wen   +9 more
doaj   +1 more source

Home - About - Disclaimer - Privacy