Results 21 to 30 of about 11,187 (236)
Enhanced image security using residue number system and new Arnold transform
This paper aims to improve the image scrambling and encryption effect in traditional two-dimensional discrete Arnold transform by introducing a new Residue number system (RNS) with three moduli and the New Arnold Transform. The study focuses on improving
Akinbowale Nathaniel Babatunde+3 more
doaj +1 more source
Secure Key-Based Substitution-Boxes Design Using Systematic Search for High Nonlinearity
The significance of data security has become more critical due to the ever-changing goals and capabilities of attackers. As a result, many cryptosystems employing diverse approaches are being developed to safeguard sensitive data.
Amjad Hussain Zahid+4 more
doaj +1 more source
Fast Cramer-Shoup Cryptosystem [PDF]
Cramer-Shoup was the first practical adaptive CCA-secure public key encryption scheme. We propose a faster version of this encryption scheme, called Fast Cramer-Shoup. We show empirically and theoretically that our scheme is faster than three versions proposed by Cramer-Shoup in 1998. We observe an average gain of 60% for the decryption algorithm.
Lafourcade, Pascal+2 more
openaire +5 more sources
Composite cellular automata based encryption method applied to surveillance videos
This work is part of the research project “Encryption Models Based on Chaotic Attractors” institutionalized in the Research and Scientific Development Center of the Universidad Distrital Francisco José de Caldas.
Luis Miguel Cortés Martinez+2 more
doaj +1 more source
Optical Correlators for Cryptosystems and Image Recognition: A Review
Optical correlators are efficient optical systems that have gained a wide range of applications both in image recognition and encryption, due to their special properties that benefit from the optoelectronic setup instead of an all-electronic one.
Andrei Drăgulinescu
doaj +1 more source
A Lucas based cryptosystem analog to the ElGamal cryptosystem and elliptic curve cryptosystem [PDF]
In this paper, a new cryptosystem will be developed which is analogue to ElGamal encryption scheme and based on Lucas sequence in the elliptic curve group over finite field. In this encryption scheme, an Elliptic curve Diffie-Hellman (ECDH) key agreement be the first part of the encryption, the keys of this encryption scheme is defined based on ...
Mohamed Othman+3 more
openaire +2 more sources
Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT
In recent years, the Internet of Things (IoT) has found wide application and attracted much attention. Since most of the end-terminals in IoT have limited capabilities for storage and computing, it has become a trend to outsource the data from local to ...
Hongyang Yan+3 more
doaj +1 more source
Variations of the McEliece Cryptosystem [PDF]
Two variations of the McEliece cryptosystem are presented. The first one is based on a relaxation of the column permutation in the classical McEliece scrambling process. This is done in such a way that the Hamming weight of the error, added in the encryption process, can be controlled so that efficient decryption remains possible.
Bolkema, Jessalyn+5 more
openaire +3 more sources
In this paper we describe a new cryptosystem we call "The Hush Cryptosystem" for hiding encrypted data in innocent Arabic sentences. The main purpose of this cryptosystem is to fool observer-supporting software into thinking that the encrypted data is not encrypted at all.
openaire +3 more sources
Encryption using semigroup action
Anencipheringtransformationisafunctionf thatconvertsanyplaintext message into a ciphertext message and deciphering transformation is a function f−1, which reverse the process. Such a set-up is calledacryptosystem. Inthispaper,weextendageneralizationofthe
Indira Devi Anooja+2 more
doaj +1 more source