Results 31 to 40 of about 58,841 (251)

Quantum cryptography based on photon ``frequency'' states: example of a possible realization [PDF]

open access: yes, 1998
A quantum cryptosystem is proposed using single-photon states with different frequency spectra as information carriers.
Molotkov, S. N.
core   +2 more sources

Encryption using semigroup action

open access: yesRatio Mathematica, 2021
Anencipheringtransformationisafunctionf thatconvertsanyplaintext message into a ciphertext message and deciphering transformation is a function f−1, which reverse the process. Such a set-up is calledacryptosystem. Inthispaper,weextendageneralizationofthe
Indira Devi Anooja   +2 more
doaj   +1 more source

Quantum Cryptography Based on the Time--Energy Uncertainty Relation [PDF]

open access: yes, 1996
A new cryptosystem based on the fundamental time--energy uncertainty relation is proposed. Such a cryptosystem can be implemented with both correlated photon pairs and single photon states.Comment: 5 pages, LaTex, no ...
A. K. Ekert   +23 more
core   +2 more sources

Improved Chaos-Based Cryptosystem for Medical Image Encryption and Decryption

open access: yesScientific Programming, 2020
In the medical sector, the digital image is multimedia data that contain secret information. However, designing an efficient secure cryptosystem to protect the confidential images in sharing is a challenge.
M. Gafsi   +4 more
semanticscholar   +1 more source

Generalized Fibonacci Sequences for Elliptic Curve Cryptography

open access: yesMathematics, 2023
The Fibonacci sequence is a well-known sequence of numbers with numerous applications in mathematics, computer science, and other fields. In recent years, there has been growing interest in studying Fibonacci-like sequences on elliptic curves.
Zakariae Cheddour   +2 more
doaj   +1 more source

Cryptanalysis of a novel cryptosystem based on chaotic oscillators and feedback inversion [PDF]

open access: yes, 2003
An analysis of a recently proposed cryptosystem based on chaotic oscillators and feedback inversion is presented. It is shown how the cryptosystem can be broken when Duffing's oscillator is considered.
Devaney   +7 more
core   +2 more sources

On the security of a new image encryption scheme based on chaotic map lattices [PDF]

open access: yes, 2008
This paper reports a detailed cryptanalysis of a recently proposed encryption scheme based on the logistic map. Some problems are emphasized concerning the key space definition and the implementation of the cryptosystem using floating-point operations ...
Brumley D.   +7 more
core   +2 more sources

Models of interaction of cryptography and chaotic dynamics

open access: yesҚарағанды университетінің хабаршысы. Математика сериясы, 2019
Cryptography deals with the problem of information protection by its transformation, providing the protection of information (by means of computational techniques), i.e. a set of agreed encryptian tools.
B.K. Shayakhmetova   +3 more
doaj   +1 more source

Group ring based public key cryptosystems [PDF]

open access: yesJournal of Discrete Mathematical Sciences and Cryptography, 2021, 2019
In this paper, we propose two cryptosystems based on group rings and existing cryptosystem. First one is Elliptic ElGamal type group ring public key cryptosystem whose security is greater than security of cryptosystems based on elliptic curves discrete logarithmic problem (ECDLP).
arxiv   +1 more source

A lightweight McEliece cryptosystem co-processor design [PDF]

open access: yes, 2020
Due to the rapid advances in the development of quantum computers and their susceptibility to errors, there is a renewed interest in error correction algorithms.
Agrawal, Rashmi   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy