Results 21 to 30 of about 35,576 (230)

Cipher Block Chaining Support Vector Machine for Secured Decentralized Cloud Enabled Intelligent IoT Architecture

open access: yesIEEE Access, 2021
The growth of internet era leads to a major transformation in a storage of data and accessing the applications. One such new trend that promises the endurance is the Cloud computing. Computing resources offered by the Cloud includes the servers, networks,
Debabrata Samanta   +6 more
doaj   +1 more source

The Rabin cryptosystem revisited [PDF]

open access: yesApplicable Algebra in Engineering, Communication and Computing, 2014
minor review + introduction of a deterministic scheme using quartic reciprocity that works for primes congruent 5 modulo ...
Elia, Michele   +2 more
openaire   +2 more sources

Optical Correlators for Cryptosystems and Image Recognition: A Review

open access: yesSensors, 2023
Optical correlators are efficient optical systems that have gained a wide range of applications both in image recognition and encryption, due to their special properties that benefit from the optoelectronic setup instead of an all-electronic one.
Andrei Drăgulinescu
doaj   +1 more source

Software implementation of systematic polar encoding based PKC-SPE cryptosystem for quantum cybersecurity. [PDF]

open access: yesSci Rep
The ever-growing threats in cybersecurity growing with the rapid development of quantum computing, necessitates the development of robust and quantum-resistant cryptographic systems.
Redhu R   +5 more
europepmc   +2 more sources

A New Attack on NTRU Public Key Cryptosystem Depend on Using Public Key and Public Information [PDF]

open access: yesEngineering and Technology Journal, 2010
This paper proposed a new method to attack the NTRU cryptosystem [Hof00a,Hof98b]. It tried to exploit the public information about the parameters of NTRUcryptosystem and using the public key, to recover the private keys without delvingin the detail of ...
Abdul Monem S.Rahma   +1 more
doaj   +1 more source

Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions

open access: yesCryptography, 2021
Cryptography has been used from time immemorial for preserving the confidentiality of data/information in storage or transit. Thus, cryptography research has also been evolving from the classical Caesar cipher to the modern cryptosystems, based on ...
Chithralekha Balamurugan   +3 more
doaj   +1 more source

Enhanced image security using residue number system and new Arnold transform

open access: yesJurnal Teknologi dan Sistem Komputer, 2021
This paper aims to improve the image scrambling and encryption effect in traditional two-dimensional discrete Arnold transform by introducing a new Residue number system (RNS) with three moduli and the New Arnold Transform. The study focuses on improving
Akinbowale Nathaniel Babatunde   +3 more
doaj   +1 more source

Composite cellular automata based encryption method applied to surveillance videos

open access: yesDyna, 2020
This work is part of the research project “Encryption Models Based on Chaotic Attractors” institutionalized in the Research and Scientific Development Center of the Universidad Distrital Francisco José de Caldas.
Luis Miguel Cortés Martinez   +2 more
doaj   +1 more source

Secure Key-Based Substitution-Boxes Design Using Systematic Search for High Nonlinearity

open access: yesIEEE Access, 2023
The significance of data security has become more critical due to the ever-changing goals and capabilities of attackers. As a result, many cryptosystems employing diverse approaches are being developed to safeguard sensitive data.
Amjad Hussain Zahid   +4 more
doaj   +1 more source

Efficient Image Encryption Scheme Using Novel 1D Multiparametric Dynamical Tent Map and Parallel Computing

open access: yesMathematics, 2023
In order to ensure reliable and secure image exchange, chaotic systems are often considered for their good performance in information security. In this work, we first propose an extended version of a chaotic tent map (TM)—the multiparametric 1D tent map (
Achraf Daoui   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy