Results 71 to 80 of about 37,139 (180)

Application of Algorithms on Lattices in Post-Quantum Cryptography

open access: yesСовременные информационные технологии и IT-образование
The article analyzes approaches to the development of post-quantum algorithms, reviews progress in the field of quantum computers and post-quantum cryptographic encryption systems. One of the most promising approaches is considered, which is based on the
Nikolai Urban, Elena Melnikova
doaj   +1 more source

Image cryptosystem based on plain image correlation rate and selective chaotic maps

open access: hybrid, 2022
Ahmad Pourjabbar Kari   +3 more
openalex   +1 more source

Improved Cryptanalysis and Enhancements of an Image Encryption Scheme Using Combined 1D Chaotic Maps

open access: yesEntropy, 2018
This paper presents an improved cryptanalysis of a chaos-based image encryption scheme, which integrated permutation, diffusion, and linear transformation process.
Congxu Zhu, Guojun Wang, Kehui Sun
doaj   +1 more source

Unfolding Post-Quantum Cryptosystems: CRYSTALS-Dilithium, McEliece, BIKE, and HQC

open access: yesMathematics
The advent of quantum computers poses a significant threat to the security of classical cryptographic systems. To address this concern, researchers have been actively investigating the development of post-quantum cryptography, which aims to provide ...
Vaghawan Prasad Ojha   +3 more
doaj   +1 more source

Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm

open access: yesIEEE Photonics Journal, 2019
In this paper, the security of the cryptosystem based on phase-truncation Fourier transform (PTFT) and Gerchberg-Saxton (G-S) algorithm is analyzed. In this cryptosystem, the phase key generated using phase-truncated (PT) operation is bonded with the ...
Yi Xiong, Ravi Kumar, Chenggen Quan
doaj   +1 more source

Cryptosystem Based on Induced Group Codes

open access: yesМоделирование и анализ информационных систем, 2016
The code C on a group G, induced by the code N on a subgroup H, has the property that for decoding the code C one can use the decoder for the code N.
V. M. Deundyak, Y. V. Kosolapov
doaj   +1 more source

Asymmetric Color Image Cryptosystem Using Detour Cylindrical-Diffraction and Phase Reservation & Truncation

open access: yesIEEE Access, 2018
Recently, color image encryption has attracted extensive research interests. However, challenging issues, such as linearity, complex-valued output, and information disclosure, remain.
Jun Wang, Qiong-Hua Wang, Yuhen Hu
doaj   +1 more source

Home - About - Disclaimer - Privacy