Results 71 to 80 of about 11,187 (236)
A note on using finite non-abelian $p$-groups in the MOR cryptosystem [PDF]
The MOR cryptosystem is a natural generalization of the El-Gamal cryptosystem to non-abelian groups. Using a $p$-group, a cryptosystem was built by this author in 'A simple generalization of El-Gamal cryptosystem to non-abelian groups'. It seems reasonable to assume the cryptosystem is as secure as the El-Gamal cryptosystem over finite fields.
arxiv
A comprehensive survey on software‐defined networking for smart communities
Key findings: •$$ \bullet $$ The background and history of the evolution of software‐defined networking (SDN) are discussed. •$$ \bullet $$ SDN architecture and OpenFlow infrastructure are discussed, wherein OpenFlow components and switches are classified concerning different parameters.
Rajat Chaudhary+3 more
wiley +1 more source
A novel image encryption algorithm has been developed to impart security to the digital color images. ABSTRACT The rapid proliferation of Internet of Things (IoT) devices has underscored the critical need to safeguard the data they store and transmit.
Muhammad Aqeel+6 more
wiley +1 more source
Features of Structural Hardware Transformation of Information in Cryptosystems
The article considers types, functions and some features of cryptosystems, as well as circuit design options for expanding their functionality. Options for generating keys and ciphers used in cryptosystems with a typical structural organization, and ...
A. F. Chernyavskiy+2 more
doaj +1 more source
Post-quantum cryptography-driven security framework for cloud computing
Data security in the cloud has been a major issue since the inception and adoption of cloud computing. Various frameworks have been proposed, and yet data breach prevails.
Ukwuoma Henry Chima+3 more
doaj +1 more source
Blockchain‐Enabled Car Sharing: Enhancing Reliability and Vehicle History Management
The paper addresses the growing demand for cost‐effective transportation solutions amidst rising car ownership expenses by proposing a decentralized car‐sharing and renting platform called Crowd CarLink, leveraging blockchain technology. This platform enables secure recording of vehicle maintenance and lease history while overcoming challenges of ...
Chen Ben Tolila+3 more
wiley +1 more source
Le cryptosysteme non-commutatif [PDF]
It is showed a new cryptosystem based on non-commutativ calculations of matrices, more specially nilpotent matrices. The cryptosystem seems powerful to restsist against usual attacks.
arxiv
Towards quantum‐safe blockchain: Exploration of PQC and public‐key recovery on embedded systems
This paper addresses the need for quantum‐safe blockchain solutions specifically for embedded systems by integrating Post‐Quantum Cryptography (PQC) into blockchain frameworks. We propose a quantum‐secure blockchain architecture using NIST‐standardized PQC algorithms, finding Falcon‐512 to be optimal for embedded environments due to its security and ...
Dominik Marchsreiter
wiley +1 more source
Security analysis and enhancements of an image cryptosystem based on hyperchaotic system
The security system engaged to transfer securely the sensitive information over wireless channels must posses some innate features such as high resistivity to various cryptographic attacks, high sensitivity to secret key and plaintext, and strong ...
Musheer Ahmad+2 more
doaj
Improved Cryptanalysis and Enhancements of an Image Encryption Scheme Using Combined 1D Chaotic Maps
This paper presents an improved cryptanalysis of a chaos-based image encryption scheme, which integrated permutation, diffusion, and linear transformation process.
Congxu Zhu, Guojun Wang, Kehui Sun
doaj +1 more source