Results 11 to 20 of about 93,492 (364)
A new algorithm for biometric templates using a 6D-chaotic system, and 2D fractional discrete cosine transform (FrDCT) is proposed in this paper. In this technique, the $k$ biometric templates are represented into three groups.
Dhanesh Kumar +9 more
doaj +1 more source
Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions
Cryptographic voting protocols have recently seen much interest from practitioners due to their (planned) use in countries such as Estonia, Switzerland, France, and Australia.
Diego F. Aranha +3 more
semanticscholar +1 more source
A Novel RGB Image Obfuscation Technique Using Dynamically Generated All Order-4 Magic Squares
Plethora of image encryption schemes exist in literature based on the construct of magic square for realizing the purpose of image obfuscation. This magic square carries out the scrambling project of the encryption.
Mahmood Ul Hassan +5 more
doaj +1 more source
In LWE-based KEMs, observed decryption errors leak information about the secret key in the form of equations or inequalities. Several practical fault attacks have already exploited such leakage by either directly applying a fault or enabling a chosen ...
Julius Hermelink +4 more
semanticscholar +1 more source
Generalization of RSA cryptosystem based on 2n primes
This article introduced a new generalized RSA crypto-system based on $ 2n $ prime numbers called generalized RSA (GRSA). This is a modern technique to provide supreme security for the computer world by factoring the variable$ N $, where its analysis ...
Tariq Shah +4 more
doaj +1 more source
Quantum Fully Homomorphic Encryption With Verification [PDF]
Fully-homomorphic encryption (FHE) enables computation on encrypted data while maintaining secrecy. Recent research has shown that such schemes exist even for quantum computation.
A Broadbent +9 more
core +10 more sources
Exploring high‐safety but convenient encryption and decryption technologies to combat threats of information leakage is urgently needed but remains a great challenge.
Dong Li +9 more
semanticscholar +1 more source
On the Image Encryption Algorithm Based on the Chaotic System, DNA Encoding, and Castle
Hundreds of image encryption algorithms have been developed for the security and integrity of images through the combination of DNA computing and chaotic maps.
Nadeem Iqbal +6 more
doaj +1 more source
Program for Simulation and Testing of Apply Cryptography of Advance Encryption Standard (AES) Algorithm with Rivest-Shamir-Adleman (RSA) Algorithm for Good Performance [PDF]
Nowadays, information security management systems are important parts of managing a system for better handling of the information security. In scenarios and situations where safety management is done by managing protection of malwares, it is important to
Santi Pattanavichai
doaj +1 more source
Analysis of common attacks in LDPCC-based public-key cryptosystems [PDF]
We analyze the security and reliability of a recently proposed class of public-key cryptosystems against attacks by unauthorized parties who have acquired partial knowledge of one or more of the private key components and/or of the plaintext.
D. Saad +17 more
core +2 more sources

