Results 41 to 50 of about 11,187 (236)

A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos

open access: yesRemote Sensing, 2020
Aerial photography involves capturing images from aircraft and other flying objects, including Unmanned Aerial Vehicles (UAV). Aerial images are used in many fields and can contain sensitive information that requires secure processing.
Fawad Masood   +6 more
doaj   +1 more source

A Secure Chaos-Based Lightweight Cryptosystem for the Internet of Things

open access: yesIEEE Access, 2023
This paper introduces a novel approach to addressing the security challenges of the Internet of Things (IoT) by presenting a secure Chaos-based lightweight cryptosystem.
Wajih El Hadj Youssef   +8 more
doaj   +1 more source

Comprehensive Introduction to Fully Homomorphic Encryption for Dynamic Feedback Controller via LWE-based Cryptosystem [PDF]

open access: yesPrivacy in Dynamical Systems, Springer, 2020, 2019
The cryptosystem based on the Learning-with-Errors (LWE) problem is considered as a post-quantum cryptosystem, because it is not based on the factoring problem with large primes which is easily solved by a quantum computer. Moreover, the LWE-based cryptosystem allows fully homomorphic arithmetics so that two encrypted variables can be added and ...
arxiv   +1 more source

Energy Efficient Encryption Algorithm for Low Resources Devices

open access: yesARCHive-SR, 2019
Saving energy is one of the most challenging aspects in the wireless network devices. Such devices are connected together to perform a certain task. A well-known example of these structures is the Wireless Sensor Network (WSN).
Bassam W. Aboshosha   +2 more
doaj   +1 more source

Towards Analysable Chaos-based Cryptosystems: Constructing Difference Distribution Tables for Chaotic Maps

open access: yesJournal of Informatics and Web Engineering
Chaos-based cryptography has yet to achieve practical, real-world applications despite extensive research. A major challenge is the difficulty in analysing the security of these cryptosystems, which often appear ad hoc in design.
Je Sen Teh, Abubakar Abba
doaj   +1 more source

A Palmprint Cryptosystem [PDF]

open access: yes, 2007
Traditional cryptosystems are based on passwords, which can be cracked (simple ones) or forgotten (complex ones). This paper proposes a novel cryptosystem based on palmprints. This system directly uses the palmprint as a key to encrypt/decrypt information.
Kuanquan Wang, Xiangqian Wu, David Zhang
openaire   +2 more sources

A fingerprint biometric cryptosystem in FPGA [PDF]

open access: yes2015 IEEE International Conference on Industrial Technology (ICIT), 2015
Peer ...
ARJONA, ROSARIO, Baturone, Iluminada
openaire   +4 more sources

An adaptive cryptosystem on a Finite Field

open access: yesPeerJ Computer Science, 2021
Owing to mathematical theory and computational power evolution, modern cryptosystems demand ingenious trapdoor functions as their foundation to extend the gap between an enthusiastic interceptor and sensitive information. This paper introduces an adaptive block encryption scheme.
Unnikrishnan Menon, Awnon Bhowmik
openaire   +4 more sources

Implementing a Chaotic Cryptosystem by Performing Parallel Computing on Embedded Systems with Multiprocessors

open access: yesEntropy, 2019
Profiling and parallel computing techniques in a cluster of six embedded systems with multiprocessors are introduced herein to implement a chaotic cryptosystem for digital color images. The proposed encryption method is based on stream encryption using a
Abraham Flores-Vergara   +7 more
doaj   +1 more source

Cryptoanalysis McEliece-type cryptosystem based on correction of errors and erasures [PDF]

open access: yesarXiv, 2023
Krouk, Tavernier and Kabatiansky proposed new variants of the McEliece cryptosystem. In this letter, it is shown that cryptosystem based on correction of errors erasures is equal to the Mc-Eliece cryptosystem with worse parametrs public key.
arxiv  

Home - About - Disclaimer - Privacy