Results 21 to 30 of about 11,187 (236)

Enhanced image security using residue number system and new Arnold transform

open access: yesJurnal Teknologi dan Sistem Komputer, 2021
This paper aims to improve the image scrambling and encryption effect in traditional two-dimensional discrete Arnold transform by introducing a new Residue number system (RNS) with three moduli and the New Arnold Transform. The study focuses on improving
Akinbowale Nathaniel Babatunde   +3 more
doaj   +1 more source

Secure Key-Based Substitution-Boxes Design Using Systematic Search for High Nonlinearity

open access: yesIEEE Access, 2023
The significance of data security has become more critical due to the ever-changing goals and capabilities of attackers. As a result, many cryptosystems employing diverse approaches are being developed to safeguard sensitive data.
Amjad Hussain Zahid   +4 more
doaj   +1 more source

Fast Cramer-Shoup Cryptosystem [PDF]

open access: yesProceedings of the 18th International Conference on Security and Cryptography, 2021
Cramer-Shoup was the first practical adaptive CCA-secure public key encryption scheme. We propose a faster version of this encryption scheme, called Fast Cramer-Shoup. We show empirically and theoretically that our scheme is faster than three versions proposed by Cramer-Shoup in 1998. We observe an average gain of 60% for the decryption algorithm.
Lafourcade, Pascal   +2 more
openaire   +5 more sources

Composite cellular automata based encryption method applied to surveillance videos

open access: yesDyna, 2020
This work is part of the research project “Encryption Models Based on Chaotic Attractors” institutionalized in the Research and Scientific Development Center of the Universidad Distrital Francisco José de Caldas.
Luis Miguel Cortés Martinez   +2 more
doaj   +1 more source

Optical Correlators for Cryptosystems and Image Recognition: A Review

open access: yesSensors, 2023
Optical correlators are efficient optical systems that have gained a wide range of applications both in image recognition and encryption, due to their special properties that benefit from the optoelectronic setup instead of an all-electronic one.
Andrei Drăgulinescu
doaj   +1 more source

A Lucas based cryptosystem analog to the ElGamal cryptosystem and elliptic curve cryptosystem [PDF]

open access: yesAIP Conference Proceedings, 2014
In this paper, a new cryptosystem will be developed which is analogue to ElGamal encryption scheme and based on Lucas sequence in the elliptic curve group over finite field. In this encryption scheme, an Elliptic curve Diffie-Hellman (ECDH) key agreement be the first part of the encryption, the keys of this encryption scheme is defined based on ...
Mohamed Othman   +3 more
openaire   +2 more sources

Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT

open access: yesSensors, 2018
In recent years, the Internet of Things (IoT) has found wide application and attracted much attention. Since most of the end-terminals in IoT have limited capabilities for storage and computing, it has become a trend to outsource the data from local to ...
Hongyang Yan   +3 more
doaj   +1 more source

Variations of the McEliece Cryptosystem [PDF]

open access: yes, 2017
Two variations of the McEliece cryptosystem are presented. The first one is based on a relaxation of the column permutation in the classical McEliece scrambling process. This is done in such a way that the Hamming weight of the error, added in the encryption process, can be controlled so that efficient decryption remains possible.
Bolkema, Jessalyn   +5 more
openaire   +3 more sources

The hush cryptosystem [PDF]

open access: yesProceedings of the 2nd international conference on Security of information and networks - SIN '09, 2009
In this paper we describe a new cryptosystem we call "The Hush Cryptosystem" for hiding encrypted data in innocent Arabic sentences. The main purpose of this cryptosystem is to fool observer-supporting software into thinking that the encrypted data is not encrypted at all.
openaire   +3 more sources

Encryption using semigroup action

open access: yesRatio Mathematica, 2021
Anencipheringtransformationisafunctionf thatconvertsanyplaintext message into a ciphertext message and deciphering transformation is a function f−1, which reverse the process. Such a set-up is calledacryptosystem. Inthispaper,weextendageneralizationofthe
Indira Devi Anooja   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy