Results 1 to 10 of about 39,226 (149)
A Novel Data Encryption Algorithm To Ensure Database Security
Many people apply technologies gradually, moving towards new progress and development. Moreover, many of us utilize database systems to assist our work management; the database contains our work or personal information, which increases the risk of losing
Sivan İbrahim +4 more
doaj +1 more source
Encryption of Color Images utilizing cascading 3D Chaotic Maps with S-Box Algorithms
The fundamental characteristics of chaos, including sensitivity to beginning conditions and unpredictability, render it a prime candidate for cryptographic applications.
Jenan Ayad +3 more
doaj +1 more source
Area-Time Efficient Hardware Architecture for CRYSTALS-Kyber
This paper presents a novel area-time efficient hardware architecture of the lattice-based CRYSTALS-Kyber, which has entered the third round of the post-quantum cryptography standardization competition hosted by the National Institute of Standards and ...
Tuy Tan Nguyen +3 more
doaj +1 more source
Meta-optics empowered vector visual cryptography for high security and rapid decryption
Optical encryption is a promising approach to protecting secret information owing to the advantages of low-power consumption, parallel, high-speed, and multi-dimensional processing capabilities. Nevertheless, conventional strategies generally suffer from
Fei Zhang +9 more
semanticscholar +1 more source
Failing gracefully: Decryption failures and the Fujisaki-Okamoto transform [PDF]
In known security reductions for the Fujisaki-Okamoto transformation, decryption failures are handled via a reduction solving the rather unnatural task of finding failing plaintexts given the private key, resulting in a Grover search bound.
Kathrin Hövelmanns +2 more
semanticscholar +1 more source
DeepEDN: A Deep-Learning-Based Image Encryption and Decryption Network for Internet of Medical Things [PDF]
Internet of Medical Things (IoMT) can connect many medical imaging equipment to the medical information network to facilitate the process of diagnosing and treating doctors.
Yi Ding +6 more
semanticscholar +1 more source
The utilization of mobile learning continues to rise and has attracted many organizations, university environments and institutions of higher education all over the world.
Ghadah Aldabbagh +5 more
doaj +1 more source
A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers.
Bader Alouffi +5 more
doaj +1 more source
Asymptotic Bound for RSA Variant with Three Decryption Exponents
This paper presents a cryptanalysis attack on the RSA variant with modulus $N=p^rq$ for $r\geq 2$ with three public and private exponents $(e_1,d_1),$ $(e_2,d_2),$ $(e_3,d_3)$ sharing the same modulus $N$ where $p$ and $q$ are consider to prime having ...
Amınu Alhajı Ibrahım +2 more
doaj +1 more source
Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions
Cryptographic voting protocols have recently seen much interest from practitioners due to their (planned) use in countries such as Estonia, Switzerland, France, and Australia.
Diego F. Aranha +3 more
semanticscholar +1 more source

