Results 1 to 10 of about 58,616 (313)

On the Image Encryption Algorithm Based on the Chaotic System, DNA Encoding, and Castle

open access: yesIEEE Access, 2021
Hundreds of image encryption algorithms have been developed for the security and integrity of images through the combination of DNA computing and chaotic maps.
Nadeem Iqbal   +6 more
doaj   +1 more source

Serial encryption using the functions of real variable

open access: yesРадіоелектронні і комп'ютерні системи, 2021
Context. Using the functions of a real variable in cryptosystems as keys allow increasing their cryptographic strength since it is more difficult to select such keys. Therefore, the development of such systems is relevant. Objective.
Viktor Avramenko, Volodymyr Demianenko
doaj   +1 more source

6D-Chaotic System and 2D Fractional Discrete Cosine Transform Based Encryption of Biometric Templates

open access: yesIEEE Access, 2021
A new algorithm for biometric templates using a 6D-chaotic system, and 2D fractional discrete cosine transform (FrDCT) is proposed in this paper. In this technique, the $k$ biometric templates are represented into three groups.
Dhanesh Kumar   +9 more
doaj   +1 more source

A Novel Data Encryption Algorithm To Ensure Database Security

open access: yesActa Infologica, 2023
Many people apply technologies gradually, moving towards new progress and development. Moreover, many of us utilize database systems to assist our work management; the database contains our work or personal information, which increases the risk of losing
Sivan İbrahim   +4 more
doaj   +1 more source

Secure Data Exchange in M-Learning Platform using Adaptive Tunicate Slime-Mold-Based Hybrid Optimal Elliptic Curve Cryptography

open access: yesApplied Sciences, 2021
The utilization of mobile learning continues to rise and has attracted many organizations, university environments and institutions of higher education all over the world.
Ghadah Aldabbagh   +5 more
doaj   +1 more source

A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies

open access: yesIEEE Access, 2021
Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers.
Bader Alouffi   +5 more
doaj   +1 more source

Asymptotic Bound for RSA Variant with Three Decryption Exponents

open access: yesJournal of Mathematical Sciences and Modelling, 2023
This paper presents a cryptanalysis attack on the RSA variant with modulus $N=p^rq$ for $r\geq 2$ with three public and private exponents $(e_1,d_1),$ $(e_2,d_2),$ $(e_3,d_3)$ sharing the same modulus $N$ where $p$ and $q$ are consider to prime having ...
Amınu Alhajı Ibrahım   +2 more
doaj   +1 more source

A Novel RGB Image Obfuscation Technique Using Dynamically Generated All Order-4 Magic Squares

open access: yesIEEE Access, 2023
Plethora of image encryption schemes exist in literature based on the construct of magic square for realizing the purpose of image obfuscation. This magic square carries out the scrambling project of the encryption.
Mahmood Ul Hassan   +5 more
doaj   +1 more source

Program for Simulation and Testing of Apply Cryptography of Advance Encryption Standard (AES) Algorithm with Rivest-Shamir-Adleman (RSA) Algorithm for Good Performance [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2022
Nowadays, information security management systems are important parts of managing a system for better handling of the information security. In scenarios and situations where safety management is done by managing protection of malwares, it is important to
Santi Pattanavichai
doaj   +1 more source

Generalization of RSA cryptosystem based on 2n primes

open access: yesAIMS Mathematics, 2023
This article introduced a new generalized RSA crypto-system based on $ 2n $ prime numbers called generalized RSA (GRSA). This is a modern technique to provide supreme security for the computer world by factoring the variable$ N $, where its analysis ...
Tariq Shah   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy