Results 51 to 60 of about 37,139 (180)
ABSTRACT E‐learning systems in an educational environment designed for wireless area networks for schools, universities, and research institutions provide consistency and better retention for students, professors, and researchers. An E‐learning system is known for storing lecture documents and live video conferences that are transmitted over public ...
Ahmed A. Mawgoud +4 more
wiley +1 more source
Fraud Detection in Privacy Preserving Health Insurance System Using Blockchain Technology
A privacy‐preserving and fraud‐detection‐enabled health insurance claim system has been proposed that addresses the dual challenges of privacy preservation and fraud detection in health insurance claims. The proposed model enables both patients and healthcare providers to submit claims securely, ensuring patient anonymity while effectively detecting ...
Md. Mazharul Islam +4 more
wiley +1 more source
Analisys of Lattice-based Public Key Cryptosystems
Mathematical problems for lattice-based public key cryptosystem design are analyzed. A method of constructing theoretically strong against quantum attacks cryptosystem is proposed.
A. R. Orlov, E. B. Makhovenko
doaj
Quantum Computing: Foundations, Architecture and Applications
This paper presents a study on quantum computing's theoretical foundations and applications, illustrated by a quantum circuit diagram featuring gates and measurements that demonstrate qubit manipulation and entanglement. ABSTRACT Quantum computing exploits the principles of quantum mechanics to address computational problems that are intractable to ...
Christopher Columbus Chinnappan +4 more
wiley +1 more source
MOR Cryptosystem and classical Chevalley groups in odd characteristic [PDF]
In this paper we study the MOR cryptosystem using finite classical Chevalley groups over a finite field of odd characteristic. In the process we develop an algorithm for these Chevalley groups in the same spirit as the row-column operation for special ...
Mahalanobis, Ayan, Singh, Anupam
core
A McEliece cryptosystem using permutation codes
This paper is an attempt to build a new public-key cryptosystem, similar to the McEliece cryptosystem, using permutation error-correcting codes. We study a public-key cryptosystem built using two permutation error-correcting codes.
Srinivasan Adarsh, Mahalanobis Ayan
doaj +1 more source
ABSTRACT Integer and modular arithmetic is a fundamental area of mathematics, with extensive applications in computer science, and is essential for cryptographic protocols, error correction, and algorithm efficiency. However, students often struggle to understand its abstract nature, especially when transitioning from theoretical knowledge to practical
Violeta Migallón +2 more
wiley +1 more source
On Decoding Schemes for the MDPC-McEliece Cryptosystem [PDF]
Recently, it has been shown how McEliece public-key cryptosystems based on moderate-density parity-check (MDPC) codes allow for very compact keys compared to variants based on other code families. In this paper, classical (iterative) decoding schemes for
Bartz, Hannes, Liva, Gianluigi
core +1 more source
How Can Cryptography Secure Online Assessments Against Academic Dishonesty?
ABSTRACT Popular learning platforms like Canvas LMS (Learning Management System), Moodle, and Google Forms have become widespread among university students. This research focuses on these platforms because of their significant role in modern online education.
Aarav Ashish Mehrishi +2 more
wiley +1 more source
On the efficiency of a general attack against the MOBS cryptosystem [PDF]
Christopher Battarbee +3 more
openalex +1 more source

