Results 61 to 70 of about 2,385 (165)

A Post-Quantum Public-Key Signcryption Scheme over Scalar Integers Based on a Modified LWE Structure

open access: yesSensors
To ensure confidentiality and integrity in the era of quantum computing, most post-quantum cryptographic schemes are designed to achieve either encryption or digital signature functionalities separately.
Mostefa Kara   +3 more
doaj   +1 more source

Adaptive DNA Cryptography With Intelligent Machine Learning for Cloud Data Defense

open access: yesEngineering Reports
With the exponential growth of sensitive data generated and stored in cloud environments, traditional cryptographic techniques are increasingly strained in addressing emerging security threats.
Animesh Kairi   +4 more
doaj   +1 more source

Improved Cryptanalysis and Enhancements of an Image Encryption Scheme Using Combined 1D Chaotic Maps

open access: yesEntropy, 2018
This paper presents an improved cryptanalysis of a chaos-based image encryption scheme, which integrated permutation, diffusion, and linear transformation process.
Congxu Zhu, Guojun Wang, Kehui Sun
doaj   +1 more source

Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm

open access: yesIEEE Photonics Journal, 2019
In this paper, the security of the cryptosystem based on phase-truncation Fourier transform (PTFT) and Gerchberg-Saxton (G-S) algorithm is analyzed. In this cryptosystem, the phase key generated using phase-truncated (PT) operation is bonded with the ...
Yi Xiong, Ravi Kumar, Chenggen Quan
doaj   +1 more source

Cryptosystem Based on Induced Group Codes

open access: yesМоделирование и анализ информационных систем, 2016
The code C on a group G, induced by the code N on a subgroup H, has the property that for decoding the code C one can use the decoder for the code N.
V. M. Deundyak, Y. V. Kosolapov
doaj   +1 more source

Asymmetric Color Image Cryptosystem Using Detour Cylindrical-Diffraction and Phase Reservation & Truncation

open access: yesIEEE Access, 2018
Recently, color image encryption has attracted extensive research interests. However, challenging issues, such as linearity, complex-valued output, and information disclosure, remain.
Jun Wang, Qiong-Hua Wang, Yuhen Hu
doaj   +1 more source

Asymmetric Cryptosystem Using Improved Equal Modulus Decomposition in Cylindrical Diffraction Domain

open access: yesIEEE Access, 2019
We present a simple and efficient asymmetric cryptosystem using an improved equal modulus decomposition (EMD) in the cylindrical diffraction domain. Being different from a cryptosystem based on the conventional EMD, whose outputs are complex-valued, in ...
Jun Wang   +4 more
doaj   +1 more source

Features of Structural Hardware Transformation of Information in Cryptosystems

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники
The article considers types, functions and some features of cryptosystems, as well as circuit design options for expanding their functionality. Options for generating keys and ciphers used in cryptosystems with a typical structural organization, and ...
A. F. Chernyavskiy   +2 more
doaj   +1 more source

Using Modified Gorti-enhanced Homomorphic Cryptosystem to Improve Security of ECG Signal

open access: yesJournal of Telecommunications and Information Technology
While offering vast data storage capabilities, cloud computing poses numerous security- and privacy-related challenges. This requires robust security measures, particularly for sensitive data, such as electrocardiograms (ECG). Homomorphic encryption (HE)
Fatma Zohra Besmi   +2 more
doaj   +1 more source

AN IDEA FOR KNAPSACK CRYPTOSYSTEM BACKDOOR

open access: yesБезопасность информационных технологий
There are practically no known backdoors in a knapsack cryptosystem, the security of which is based on the difficulty of solving the knapsack packing problem.
Mikhail A. Ivanov
doaj   +1 more source

Home - About - Disclaimer - Privacy