Results 71 to 80 of about 11,187 (236)

A note on using finite non-abelian $p$-groups in the MOR cryptosystem [PDF]

open access: yesarXiv, 2007
The MOR cryptosystem is a natural generalization of the El-Gamal cryptosystem to non-abelian groups. Using a $p$-group, a cryptosystem was built by this author in 'A simple generalization of El-Gamal cryptosystem to non-abelian groups'. It seems reasonable to assume the cryptosystem is as secure as the El-Gamal cryptosystem over finite fields.
arxiv  

A comprehensive survey on software‐defined networking for smart communities

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 1, 10 January 2025.
Key findings: •$$ \bullet $$ The background and history of the evolution of software‐defined networking (SDN) are discussed. •$$ \bullet $$ SDN architecture and OpenFlow infrastructure are discussed, wherein OpenFlow components and switches are classified concerning different parameters.
Rajat Chaudhary   +3 more
wiley   +1 more source

A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications

open access: yesEngineering Reports, Volume 7, Issue 1, January 2025.
A novel image encryption algorithm has been developed to impart security to the digital color images. ABSTRACT The rapid proliferation of Internet of Things (IoT) devices has underscored the critical need to safeguard the data they store and transmit.
Muhammad Aqeel   +6 more
wiley   +1 more source

Features of Structural Hardware Transformation of Information in Cryptosystems

open access: yesDoklady Belorusskogo gosudarstvennogo universiteta informatiki i radioèlektroniki
The article considers types, functions and some features of cryptosystems, as well as circuit design options for expanding their functionality. Options for generating keys and ciphers used in cryptosystems with a typical structural organization, and ...
A. F. Chernyavskiy   +2 more
doaj   +1 more source

Post-quantum cryptography-driven security framework for cloud computing

open access: yesOpen Computer Science, 2022
Data security in the cloud has been a major issue since the inception and adoption of cloud computing. Various frameworks have been proposed, and yet data breach prevails.
Ukwuoma Henry Chima   +3 more
doaj   +1 more source

Blockchain‐Enabled Car Sharing: Enhancing Reliability and Vehicle History Management

open access: yesEngineering Reports, Volume 7, Issue 1, January 2025.
The paper addresses the growing demand for cost‐effective transportation solutions amidst rising car ownership expenses by proposing a decentralized car‐sharing and renting platform called Crowd CarLink, leveraging blockchain technology. This platform enables secure recording of vehicle maintenance and lease history while overcoming challenges of ...
Chen Ben Tolila   +3 more
wiley   +1 more source

Le cryptosysteme non-commutatif [PDF]

open access: yesarXiv, 2001
It is showed a new cryptosystem based on non-commutativ calculations of matrices, more specially nilpotent matrices. The cryptosystem seems powerful to restsist against usual attacks.
arxiv  

Towards quantum‐safe blockchain: Exploration of PQC and public‐key recovery on embedded systems

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
This paper addresses the need for quantum‐safe blockchain solutions specifically for embedded systems by integrating Post‐Quantum Cryptography (PQC) into blockchain frameworks. We propose a quantum‐secure blockchain architecture using NIST‐standardized PQC algorithms, finding Falcon‐512 to be optimal for embedded environments due to its security and ...
Dominik Marchsreiter
wiley   +1 more source

Security analysis and enhancements of an image cryptosystem based on hyperchaotic system

open access: yesJournal of King Saud University: Computer and Information Sciences, 2021
The security system engaged to transfer securely the sensitive information over wireless channels must posses some innate features such as high resistivity to various cryptographic attacks, high sensitivity to secret key and plaintext, and strong ...
Musheer Ahmad   +2 more
doaj  

Improved Cryptanalysis and Enhancements of an Image Encryption Scheme Using Combined 1D Chaotic Maps

open access: yesEntropy, 2018
This paper presents an improved cryptanalysis of a chaos-based image encryption scheme, which integrated permutation, diffusion, and linear transformation process.
Congxu Zhu, Guojun Wang, Kehui Sun
doaj   +1 more source

Home - About - Disclaimer - Privacy