Results 21 to 30 of about 35,576 (230)
The growth of internet era leads to a major transformation in a storage of data and accessing the applications. One such new trend that promises the endurance is the Cloud computing. Computing resources offered by the Cloud includes the servers, networks,
Debabrata Samanta+6 more
doaj +1 more source
The Rabin cryptosystem revisited [PDF]
minor review + introduction of a deterministic scheme using quartic reciprocity that works for primes congruent 5 modulo ...
Elia, Michele+2 more
openaire +2 more sources
Optical Correlators for Cryptosystems and Image Recognition: A Review
Optical correlators are efficient optical systems that have gained a wide range of applications both in image recognition and encryption, due to their special properties that benefit from the optoelectronic setup instead of an all-electronic one.
Andrei Drăgulinescu
doaj +1 more source
Software implementation of systematic polar encoding based PKC-SPE cryptosystem for quantum cybersecurity. [PDF]
The ever-growing threats in cybersecurity growing with the rapid development of quantum computing, necessitates the development of robust and quantum-resistant cryptographic systems.
Redhu R+5 more
europepmc +2 more sources
A New Attack on NTRU Public Key Cryptosystem Depend on Using Public Key and Public Information [PDF]
This paper proposed a new method to attack the NTRU cryptosystem [Hof00a,Hof98b]. It tried to exploit the public information about the parameters of NTRUcryptosystem and using the public key, to recover the private keys without delvingin the detail of ...
Abdul Monem S.Rahma+1 more
doaj +1 more source
Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions
Cryptography has been used from time immemorial for preserving the confidentiality of data/information in storage or transit. Thus, cryptography research has also been evolving from the classical Caesar cipher to the modern cryptosystems, based on ...
Chithralekha Balamurugan+3 more
doaj +1 more source
Enhanced image security using residue number system and new Arnold transform
This paper aims to improve the image scrambling and encryption effect in traditional two-dimensional discrete Arnold transform by introducing a new Residue number system (RNS) with three moduli and the New Arnold Transform. The study focuses on improving
Akinbowale Nathaniel Babatunde+3 more
doaj +1 more source
Composite cellular automata based encryption method applied to surveillance videos
This work is part of the research project “Encryption Models Based on Chaotic Attractors” institutionalized in the Research and Scientific Development Center of the Universidad Distrital Francisco José de Caldas.
Luis Miguel Cortés Martinez+2 more
doaj +1 more source
Secure Key-Based Substitution-Boxes Design Using Systematic Search for High Nonlinearity
The significance of data security has become more critical due to the ever-changing goals and capabilities of attackers. As a result, many cryptosystems employing diverse approaches are being developed to safeguard sensitive data.
Amjad Hussain Zahid+4 more
doaj +1 more source
In order to ensure reliable and secure image exchange, chaotic systems are often considered for their good performance in information security. In this work, we first propose an extended version of a chaotic tent map (TM)—the multiparametric 1D tent map (
Achraf Daoui+4 more
doaj +1 more source