Results 71 to 80 of about 59,589 (271)

Hardware Security in the Connected World

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 15, Issue 3, September 2025.
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee   +4 more
wiley   +1 more source

Koblitz curve cryptosystems

open access: yesFinite Fields and Their Applications, 2005
In elliptic and hyperelliptic Public Key Cryptography one needs to compute scalar multiples of a point of the curve or a divisor of its Jacobian. It is then crucial having methods to speed up such an arithmetic operation. In her Ph.D. Thesis [Efficient arithmetic on hyperelliptic curves, University Essen (2001; Zbl 1047.94008)] and several papers the ...
openaire   +3 more sources

Enhancing Data Privacy and Trust in E‐Learning: A Blockchain‐Based Access Control Protocol for Cloud Educational Systems

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 18-20, 30 August 2025.
ABSTRACT E‐learning systems in an educational environment designed for wireless area networks for schools, universities, and research institutions provide consistency and better retention for students, professors, and researchers. An E‐learning system is known for storing lecture documents and live video conferences that are transmitted over public ...
Ahmed A. Mawgoud   +4 more
wiley   +1 more source

Applications of tripled chaotic maps in cryptography

open access: yes, 2007
Security of information has become a major issue during the last decades. New algorithms based on chaotic maps were suggested for protection of different types of multimedia data, especially digital images and videos in this period. However, many of them
A. Akhavan   +48 more
core   +1 more source

Fraud Detection in Privacy Preserving Health Insurance System Using Blockchain Technology

open access: yesEngineering Reports, Volume 7, Issue 8, August 2025.
A privacy‐preserving and fraud‐detection‐enabled health insurance claim system has been proposed that addresses the dual challenges of privacy preservation and fraud detection in health insurance claims. The proposed model enables both patients and healthcare providers to submit claims securely, ensuring patient anonymity while effectively detecting ...
Md. Mazharul Islam   +4 more
wiley   +1 more source

Security Analysis of DBTRU Cryptosystem

open access: yesEntropy, 2022
DBTRU was proposed by Thang and Binh in 2015. As a variant of NTRU, the integer polynomial ring is replaced by two binary truncated polynomial rings GF(2)[x]/(xn+1). DBTRU has some advantages over NTRU in terms of security and performance. In this paper, we propose a polynomial-time linear algebra attack against the DBTRU cryptosystem, which can break ...
Xiaofei Tong   +4 more
openaire   +3 more sources

MOR Cryptosystem and classical Chevalley groups in odd characteristic [PDF]

open access: yes, 2014
In this paper we study the MOR cryptosystem using finite classical Chevalley groups over a finite field of odd characteristic. In the process we develop an algorithm for these Chevalley groups in the same spirit as the row-column operation for special ...
Mahalanobis, Ayan, Singh, Anupam
core  

ArtEM: Enhancing the Understanding of Integer and Modular Arithmetic Through Interactive Learning Software

open access: yesComputer Applications in Engineering Education, Volume 33, Issue 4, July 2025.
ABSTRACT Integer and modular arithmetic is a fundamental area of mathematics, with extensive applications in computer science, and is essential for cryptographic protocols, error correction, and algorithm efficiency. However, students often struggle to understand its abstract nature, especially when transitioning from theoretical knowledge to practical
Violeta Migallón   +2 more
wiley   +1 more source

Cryptanalysis of random-phase-encoding-based optical cryptosystem via deep learning.

open access: yesOptics Express, 2019
Random Phase Encoding (RPE) techniques for image encryption have drawn increasing attention during the past decades. We demonstrate in this contribution that the RPE-based optical cryptosystems are vulnerable to the chosen-plaintext attack (CPA) with ...
Han Hai   +5 more
semanticscholar   +1 more source

How Can Cryptography Secure Online Assessments Against Academic Dishonesty?

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 4, July/August 2025.
ABSTRACT Popular learning platforms like Canvas LMS (Learning Management System), Moodle, and Google Forms have become widespread among university students. This research focuses on these platforms because of their significant role in modern online education.
Aarav Ashish Mehrishi   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy