Results 1 to 10 of about 60,215 (284)
Decryption of historical manuscripts: the DECRYPT project [PDF]
Many historians and linguists are working individually and in an uncoordinated fashion on the identification and decryption of historical ciphers. This is a time-consuming process as they often work without access to automatic methods and processes that can accelerate the decipherment.
Megyesi, B. +9 more
openaire +3 more sources
A Novel Data Encryption Algorithm To Ensure Database Security
Many people apply technologies gradually, moving towards new progress and development. Moreover, many of us utilize database systems to assist our work management; the database contains our work or personal information, which increases the risk of losing
Sivan İbrahim +4 more
doaj +1 more source
Area-Time Efficient Hardware Architecture for CRYSTALS-Kyber
This paper presents a novel area-time efficient hardware architecture of the lattice-based CRYSTALS-Kyber, which has entered the third round of the post-quantum cryptography standardization competition hosted by the National Institute of Standards and ...
Tuy Tan Nguyen +3 more
doaj +1 more source
The utilization of mobile learning continues to rise and has attracted many organizations, university environments and institutions of higher education all over the world.
Ghadah Aldabbagh +5 more
doaj +1 more source
A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers.
Bader Alouffi +5 more
doaj +1 more source
Asymptotic Bound for RSA Variant with Three Decryption Exponents
This paper presents a cryptanalysis attack on the RSA variant with modulus $N=p^rq$ for $r\geq 2$ with three public and private exponents $(e_1,d_1),$ $(e_2,d_2),$ $(e_3,d_3)$ sharing the same modulus $N$ where $p$ and $q$ are consider to prime having ...
Amınu Alhajı Ibrahım +2 more
doaj +1 more source
Serial encryption using the functions of real variable
Context. Using the functions of a real variable in cryptosystems as keys allow increasing their cryptographic strength since it is more difficult to select such keys. Therefore, the development of such systems is relevant. Objective.
Viktor Avramenko, Volodymyr Demianenko
doaj +1 more source
A new algorithm for biometric templates using a 6D-chaotic system, and 2D fractional discrete cosine transform (FrDCT) is proposed in this paper. In this technique, the $k$ biometric templates are represented into three groups.
Dhanesh Kumar +9 more
doaj +1 more source
A Novel RGB Image Obfuscation Technique Using Dynamically Generated All Order-4 Magic Squares
Plethora of image encryption schemes exist in literature based on the construct of magic square for realizing the purpose of image obfuscation. This magic square carries out the scrambling project of the encryption.
Mahmood Ul Hassan +5 more
doaj +1 more source
On the Image Encryption Algorithm Based on the Chaotic System, DNA Encoding, and Castle
Hundreds of image encryption algorithms have been developed for the security and integrity of images through the combination of DNA computing and chaotic maps.
Nadeem Iqbal +6 more
doaj +1 more source

