Results 1 to 10 of about 39,226 (149)

A Novel Data Encryption Algorithm To Ensure Database Security

open access: yesActa Infologica, 2023
Many people apply technologies gradually, moving towards new progress and development. Moreover, many of us utilize database systems to assist our work management; the database contains our work or personal information, which increases the risk of losing
Sivan İbrahim   +4 more
doaj   +1 more source

Encryption of Color Images utilizing cascading 3D Chaotic Maps with S-Box Algorithms

open access: yesShifra, 2023
The fundamental characteristics of chaos, including sensitivity to beginning conditions and unpredictability, render it a prime candidate for cryptographic applications.
Jenan Ayad   +3 more
doaj   +1 more source

Area-Time Efficient Hardware Architecture for CRYSTALS-Kyber

open access: yesApplied Sciences, 2022
This paper presents a novel area-time efficient hardware architecture of the lattice-based CRYSTALS-Kyber, which has entered the third round of the post-quantum cryptography standardization competition hosted by the National Institute of Standards and ...
Tuy Tan Nguyen   +3 more
doaj   +1 more source

Meta-optics empowered vector visual cryptography for high security and rapid decryption

open access: yesNature Communications, 2023
Optical encryption is a promising approach to protecting secret information owing to the advantages of low-power consumption, parallel, high-speed, and multi-dimensional processing capabilities. Nevertheless, conventional strategies generally suffer from
Fei Zhang   +9 more
semanticscholar   +1 more source

Failing gracefully: Decryption failures and the Fujisaki-Okamoto transform [PDF]

open access: yesIACR Cryptology ePrint Archive, 2022
In known security reductions for the Fujisaki-Okamoto transformation, decryption failures are handled via a reduction solving the rather unnatural task of finding failing plaintexts given the private key, resulting in a Grover search bound.
Kathrin Hövelmanns   +2 more
semanticscholar   +1 more source

DeepEDN: A Deep-Learning-Based Image Encryption and Decryption Network for Internet of Medical Things [PDF]

open access: yesIEEE Internet of Things Journal, 2020
Internet of Medical Things (IoMT) can connect many medical imaging equipment to the medical information network to facilitate the process of diagnosing and treating doctors.
Yi Ding   +6 more
semanticscholar   +1 more source

Secure Data Exchange in M-Learning Platform using Adaptive Tunicate Slime-Mold-Based Hybrid Optimal Elliptic Curve Cryptography

open access: yesApplied Sciences, 2021
The utilization of mobile learning continues to rise and has attracted many organizations, university environments and institutions of higher education all over the world.
Ghadah Aldabbagh   +5 more
doaj   +1 more source

A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies

open access: yesIEEE Access, 2021
Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers.
Bader Alouffi   +5 more
doaj   +1 more source

Asymptotic Bound for RSA Variant with Three Decryption Exponents

open access: yesJournal of Mathematical Sciences and Modelling, 2023
This paper presents a cryptanalysis attack on the RSA variant with modulus $N=p^rq$ for $r\geq 2$ with three public and private exponents $(e_1,d_1),$ $(e_2,d_2),$ $(e_3,d_3)$ sharing the same modulus $N$ where $p$ and $q$ are consider to prime having ...
Amınu Alhajı Ibrahım   +2 more
doaj   +1 more source

Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions

open access: yesIACR Cryptology ePrint Archive, 2023
Cryptographic voting protocols have recently seen much interest from practitioners due to their (planned) use in countries such as Estonia, Switzerland, France, and Australia.
Diego F. Aranha   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy