Results 1 to 10 of about 93,492 (364)

Encryption–decryption-based state estimation for nonlinear complex networks subject to coupled perturbation [PDF]

open access: goldSystems Science & Control Engineering
This paper discusses the encryption-decryption-based state estimation (EDBSE) issue for coupled perturbation complex networks (CPCNs) in the framework of the Kalman-type filtering scheme.
Peixia Gao, Chaoqing Jia, Aozhan Zhou
semanticscholar   +2 more sources

Decryption of historical manuscripts: the DECRYPT project [PDF]

open access: yesCryptologia, 2020
Many historians and linguists are working individually and in an uncoordinated fashion on the identification and decryption of historical ciphers. This is a time-consuming process as they often work without access to automatic methods and processes that can accelerate the decipherment.
Megyesi, B.   +9 more
openaire   +3 more sources

A Novel Data Encryption Algorithm To Ensure Database Security

open access: yesActa Infologica, 2023
Many people apply technologies gradually, moving towards new progress and development. Moreover, many of us utilize database systems to assist our work management; the database contains our work or personal information, which increases the risk of losing
Sivan İbrahim   +4 more
doaj   +1 more source

Secure Data Exchange in M-Learning Platform using Adaptive Tunicate Slime-Mold-Based Hybrid Optimal Elliptic Curve Cryptography

open access: yesApplied Sciences, 2021
The utilization of mobile learning continues to rise and has attracted many organizations, university environments and institutions of higher education all over the world.
Ghadah Aldabbagh   +5 more
doaj   +1 more source

Meta-optics empowered vector visual cryptography for high security and rapid decryption

open access: yesNature Communications, 2023
Optical encryption is a promising approach to protecting secret information owing to the advantages of low-power consumption, parallel, high-speed, and multi-dimensional processing capabilities. Nevertheless, conventional strategies generally suffer from
Fei Zhang   +9 more
semanticscholar   +1 more source

A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies

open access: yesIEEE Access, 2021
Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers.
Bader Alouffi   +5 more
doaj   +1 more source

Failing gracefully: Decryption failures and the Fujisaki-Okamoto transform [PDF]

open access: yesIACR Cryptology ePrint Archive, 2022
In known security reductions for the Fujisaki-Okamoto transformation, decryption failures are handled via a reduction solving the rather unnatural task of finding failing plaintexts given the private key, resulting in a Grover search bound.
Kathrin Hövelmanns   +2 more
semanticscholar   +1 more source

Asymptotic Bound for RSA Variant with Three Decryption Exponents

open access: yesJournal of Mathematical Sciences and Modelling, 2023
This paper presents a cryptanalysis attack on the RSA variant with modulus $N=p^rq$ for $r\geq 2$ with three public and private exponents $(e_1,d_1),$ $(e_2,d_2),$ $(e_3,d_3)$ sharing the same modulus $N$ where $p$ and $q$ are consider to prime having ...
Amınu Alhajı Ibrahım   +2 more
doaj   +1 more source

DeepEDN: A Deep-Learning-Based Image Encryption and Decryption Network for Internet of Medical Things [PDF]

open access: yesIEEE Internet of Things Journal, 2020
Internet of Medical Things (IoMT) can connect many medical imaging equipment to the medical information network to facilitate the process of diagnosing and treating doctors.
Yi Ding   +6 more
semanticscholar   +1 more source

Serial encryption using the functions of real variable

open access: yesРадіоелектронні і комп'ютерні системи, 2021
Context. Using the functions of a real variable in cryptosystems as keys allow increasing their cryptographic strength since it is more difficult to select such keys. Therefore, the development of such systems is relevant. Objective.
Viktor Avramenko, Volodymyr Demianenko
doaj   +1 more source

Home - About - Disclaimer - Privacy