Results 21 to 30 of about 2,385 (165)

Composite cellular automata based encryption method applied to surveillance videos

open access: yesDyna, 2020
This work is part of the research project “Encryption Models Based on Chaotic Attractors” institutionalized in the Research and Scientific Development Center of the Universidad Distrital Francisco José de Caldas.
Luis Miguel Cortés Martinez   +2 more
doaj   +1 more source

Encryption using semigroup action

open access: yesRatio Mathematica, 2021
Anencipheringtransformationisafunctionf thatconvertsanyplaintext message into a ciphertext message and deciphering transformation is a function f−1, which reverse the process. Such a set-up is calledacryptosystem. Inthispaper,weextendageneralizationofthe
Indira Devi Anooja   +2 more
doaj   +1 more source

Enhanced image security using residue number system and new Arnold transform

open access: yesJurnal Teknologi dan Sistem Komputer, 2021
This paper aims to improve the image scrambling and encryption effect in traditional two-dimensional discrete Arnold transform by introducing a new Residue number system (RNS) with three moduli and the New Arnold Transform. The study focuses on improving
Akinbowale Nathaniel Babatunde   +3 more
doaj   +1 more source

Gröbner Basis Cryptosystems

open access: yesApplicable Algebra in Engineering, Communication and Computing, 2006
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Ackermann, Peter, Kreuzer, Martin
openaire   +3 more sources

Optical Correlators for Cryptosystems and Image Recognition: A Review

open access: yesSensors, 2023
Optical correlators are efficient optical systems that have gained a wide range of applications both in image recognition and encryption, due to their special properties that benefit from the optoelectronic setup instead of an all-electronic one.
Andrei Drăgulinescu
doaj   +1 more source

Elliptic Curve Cryptosystems [PDF]

open access: yesMathematics of Computation, 1987
We discuss analogs based on elliptic curves over finite fields of public key cryptosystems which use the multiplicative group of a finite field. These elliptic curve cryptosystems may be more secure, because the analog of the discrete logarithm problem on elliptic curves is likely to be harder than the classical discrete logarithm problem, especially ...
openaire   +1 more source

Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions

open access: yesCryptography, 2021
Cryptography has been used from time immemorial for preserving the confidentiality of data/information in storage or transit. Thus, cryptography research has also been evolving from the classical Caesar cipher to the modern cryptosystems, based on ...
Chithralekha Balamurugan   +3 more
doaj   +1 more source

Towards Analysable Chaos-based Cryptosystems: Constructing Difference Distribution Tables for Chaotic Maps

open access: yesJournal of Informatics and Web Engineering
Chaos-based cryptography has yet to achieve practical, real-world applications despite extensive research. A major challenge is the difficulty in analysing the security of these cryptosystems, which often appear ad hoc in design.
Je Sen Teh, Abubakar Abba
doaj   +1 more source

On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight

open access: yesIEEE Access, 2023
One of the Round 3 Finalists in the NIST post-quantum cryptography call is the Classic McEliece cryptosystem. Although it is one of the most secure cryptosystems, the large size of its public key remains a practical limitation. In this work, we propose a
Luca Mariot   +2 more
doaj   +1 more source

Implementing a Chaotic Cryptosystem by Performing Parallel Computing on Embedded Systems with Multiprocessors

open access: yesEntropy, 2019
Profiling and parallel computing techniques in a cluster of six embedded systems with multiprocessors are introduced herein to implement a chaotic cryptosystem for digital color images. The proposed encryption method is based on stream encryption using a
Abraham Flores-Vergara   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy