Results 41 to 50 of about 11,187 (236)
Aerial photography involves capturing images from aircraft and other flying objects, including Unmanned Aerial Vehicles (UAV). Aerial images are used in many fields and can contain sensitive information that requires secure processing.
Fawad Masood+6 more
doaj +1 more source
A Secure Chaos-Based Lightweight Cryptosystem for the Internet of Things
This paper introduces a novel approach to addressing the security challenges of the Internet of Things (IoT) by presenting a secure Chaos-based lightweight cryptosystem.
Wajih El Hadj Youssef+8 more
doaj +1 more source
Comprehensive Introduction to Fully Homomorphic Encryption for Dynamic Feedback Controller via LWE-based Cryptosystem [PDF]
The cryptosystem based on the Learning-with-Errors (LWE) problem is considered as a post-quantum cryptosystem, because it is not based on the factoring problem with large primes which is easily solved by a quantum computer. Moreover, the LWE-based cryptosystem allows fully homomorphic arithmetics so that two encrypted variables can be added and ...
arxiv +1 more source
Energy Efficient Encryption Algorithm for Low Resources Devices
Saving energy is one of the most challenging aspects in the wireless network devices. Such devices are connected together to perform a certain task. A well-known example of these structures is the Wireless Sensor Network (WSN).
Bassam W. Aboshosha+2 more
doaj +1 more source
Chaos-based cryptography has yet to achieve practical, real-world applications despite extensive research. A major challenge is the difficulty in analysing the security of these cryptosystems, which often appear ad hoc in design.
Je Sen Teh, Abubakar Abba
doaj +1 more source
A Palmprint Cryptosystem [PDF]
Traditional cryptosystems are based on passwords, which can be cracked (simple ones) or forgotten (complex ones). This paper proposes a novel cryptosystem based on palmprints. This system directly uses the palmprint as a key to encrypt/decrypt information.
Kuanquan Wang, Xiangqian Wu, David Zhang
openaire +2 more sources
A fingerprint biometric cryptosystem in FPGA [PDF]
Peer ...
ARJONA, ROSARIO, Baturone, Iluminada
openaire +4 more sources
An adaptive cryptosystem on a Finite Field
Owing to mathematical theory and computational power evolution, modern cryptosystems demand ingenious trapdoor functions as their foundation to extend the gap between an enthusiastic interceptor and sensitive information. This paper introduces an adaptive block encryption scheme.
Unnikrishnan Menon, Awnon Bhowmik
openaire +4 more sources
Profiling and parallel computing techniques in a cluster of six embedded systems with multiprocessors are introduced herein to implement a chaotic cryptosystem for digital color images. The proposed encryption method is based on stream encryption using a
Abraham Flores-Vergara+7 more
doaj +1 more source
Cryptoanalysis McEliece-type cryptosystem based on correction of errors and erasures [PDF]
Krouk, Tavernier and Kabatiansky proposed new variants of the McEliece cryptosystem. In this letter, it is shown that cryptosystem based on correction of errors erasures is equal to the Mc-Eliece cryptosystem with worse parametrs public key.
arxiv