Results 71 to 80 of about 37,139 (180)
Application of Algorithms on Lattices in Post-Quantum Cryptography
The article analyzes approaches to the development of post-quantum algorithms, reviews progress in the field of quantum computers and post-quantum cryptographic encryption systems. One of the most promising approaches is considered, which is based on the
Nikolai Urban, Elena Melnikova
doaj +1 more source
Image cryptosystem based on plain image correlation rate and selective chaotic maps
Ahmad Pourjabbar Kari +3 more
openalex +1 more source
Improved Cryptanalysis and Enhancements of an Image Encryption Scheme Using Combined 1D Chaotic Maps
This paper presents an improved cryptanalysis of a chaos-based image encryption scheme, which integrated permutation, diffusion, and linear transformation process.
Congxu Zhu, Guojun Wang, Kehui Sun
doaj +1 more source
Unfolding Post-Quantum Cryptosystems: CRYSTALS-Dilithium, McEliece, BIKE, and HQC
The advent of quantum computers poses a significant threat to the security of classical cryptographic systems. To address this concern, researchers have been actively investigating the development of post-quantum cryptography, which aims to provide ...
Vaghawan Prasad Ojha +3 more
doaj +1 more source
In this paper, the security of the cryptosystem based on phase-truncation Fourier transform (PTFT) and Gerchberg-Saxton (G-S) algorithm is analyzed. In this cryptosystem, the phase key generated using phase-truncated (PT) operation is bonded with the ...
Yi Xiong, Ravi Kumar, Chenggen Quan
doaj +1 more source
Design and Validation of Low-Power Secure and Dependable Elliptic Curve Cryptosystem [PDF]
Bikash Poudel +3 more
openalex +1 more source
Cryptosystem Based on Induced Group Codes
The code C on a group G, induced by the code N on a subgroup H, has the property that for decoding the code C one can use the decoder for the code N.
V. M. Deundyak, Y. V. Kosolapov
doaj +1 more source
AES Cryptosystem Development Using Neural Networks [PDF]
Siddeeq Y. Ameen, Ali H. Mahdi
openalex +1 more source
Recently, color image encryption has attracted extensive research interests. However, challenging issues, such as linearity, complex-valued output, and information disclosure, remain.
Jun Wang, Qiong-Hua Wang, Yuhen Hu
doaj +1 more source

