Results 1 to 10 of about 60,215 (284)

Decryption of historical manuscripts: the DECRYPT project [PDF]

open access: yesCryptologia, 2020
Many historians and linguists are working individually and in an uncoordinated fashion on the identification and decryption of historical ciphers. This is a time-consuming process as they often work without access to automatic methods and processes that can accelerate the decipherment.
Megyesi, B.   +9 more
openaire   +3 more sources

A Novel Data Encryption Algorithm To Ensure Database Security

open access: yesActa Infologica, 2023
Many people apply technologies gradually, moving towards new progress and development. Moreover, many of us utilize database systems to assist our work management; the database contains our work or personal information, which increases the risk of losing
Sivan İbrahim   +4 more
doaj   +1 more source

Area-Time Efficient Hardware Architecture for CRYSTALS-Kyber

open access: yesApplied Sciences, 2022
This paper presents a novel area-time efficient hardware architecture of the lattice-based CRYSTALS-Kyber, which has entered the third round of the post-quantum cryptography standardization competition hosted by the National Institute of Standards and ...
Tuy Tan Nguyen   +3 more
doaj   +1 more source

Secure Data Exchange in M-Learning Platform using Adaptive Tunicate Slime-Mold-Based Hybrid Optimal Elliptic Curve Cryptography

open access: yesApplied Sciences, 2021
The utilization of mobile learning continues to rise and has attracted many organizations, university environments and institutions of higher education all over the world.
Ghadah Aldabbagh   +5 more
doaj   +1 more source

A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies

open access: yesIEEE Access, 2021
Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers.
Bader Alouffi   +5 more
doaj   +1 more source

Asymptotic Bound for RSA Variant with Three Decryption Exponents

open access: yesJournal of Mathematical Sciences and Modelling, 2023
This paper presents a cryptanalysis attack on the RSA variant with modulus $N=p^rq$ for $r\geq 2$ with three public and private exponents $(e_1,d_1),$ $(e_2,d_2),$ $(e_3,d_3)$ sharing the same modulus $N$ where $p$ and $q$ are consider to prime having ...
Amınu Alhajı Ibrahım   +2 more
doaj   +1 more source

Serial encryption using the functions of real variable

open access: yesРадіоелектронні і комп'ютерні системи, 2021
Context. Using the functions of a real variable in cryptosystems as keys allow increasing their cryptographic strength since it is more difficult to select such keys. Therefore, the development of such systems is relevant. Objective.
Viktor Avramenko, Volodymyr Demianenko
doaj   +1 more source

6D-Chaotic System and 2D Fractional Discrete Cosine Transform Based Encryption of Biometric Templates

open access: yesIEEE Access, 2021
A new algorithm for biometric templates using a 6D-chaotic system, and 2D fractional discrete cosine transform (FrDCT) is proposed in this paper. In this technique, the $k$ biometric templates are represented into three groups.
Dhanesh Kumar   +9 more
doaj   +1 more source

A Novel RGB Image Obfuscation Technique Using Dynamically Generated All Order-4 Magic Squares

open access: yesIEEE Access, 2023
Plethora of image encryption schemes exist in literature based on the construct of magic square for realizing the purpose of image obfuscation. This magic square carries out the scrambling project of the encryption.
Mahmood Ul Hassan   +5 more
doaj   +1 more source

On the Image Encryption Algorithm Based on the Chaotic System, DNA Encoding, and Castle

open access: yesIEEE Access, 2021
Hundreds of image encryption algorithms have been developed for the security and integrity of images through the combination of DNA computing and chaotic maps.
Nadeem Iqbal   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy