Results 11 to 20 of about 93,492 (364)

6D-Chaotic System and 2D Fractional Discrete Cosine Transform Based Encryption of Biometric Templates

open access: yesIEEE Access, 2021
A new algorithm for biometric templates using a 6D-chaotic system, and 2D fractional discrete cosine transform (FrDCT) is proposed in this paper. In this technique, the $k$ biometric templates are represented into three groups.
Dhanesh Kumar   +9 more
doaj   +1 more source

Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions

open access: yesIACR Cryptology ePrint Archive, 2023
Cryptographic voting protocols have recently seen much interest from practitioners due to their (planned) use in countries such as Estonia, Switzerland, France, and Australia.
Diego F. Aranha   +3 more
semanticscholar   +1 more source

A Novel RGB Image Obfuscation Technique Using Dynamically Generated All Order-4 Magic Squares

open access: yesIEEE Access, 2023
Plethora of image encryption schemes exist in literature based on the construct of magic square for realizing the purpose of image obfuscation. This magic square carries out the scrambling project of the encryption.
Mahmood Ul Hassan   +5 more
doaj   +1 more source

Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors

open access: yesIACR Cryptology ePrint Archive, 2023
In LWE-based KEMs, observed decryption errors leak information about the secret key in the form of equations or inequalities. Several practical fault attacks have already exploited such leakage by either directly applying a fault or enabling a chosen ...
Julius Hermelink   +4 more
semanticscholar   +1 more source

Generalization of RSA cryptosystem based on 2n primes

open access: yesAIMS Mathematics, 2023
This article introduced a new generalized RSA crypto-system based on $ 2n $ prime numbers called generalized RSA (GRSA). This is a modern technique to provide supreme security for the computer world by factoring the variable$ N $, where its analysis ...
Tariq Shah   +4 more
doaj   +1 more source

Quantum Fully Homomorphic Encryption With Verification [PDF]

open access: yes, 2017
Fully-homomorphic encryption (FHE) enables computation on encrypted data while maintaining secrecy. Recent research has shown that such schemes exist even for quantum computation.
A Broadbent   +9 more
core   +10 more sources

Sophisticated yet Convenient Information Encryption/Decryption Based on Synergistically Time‐/Temperature‐Resolved Photonic Inks

open access: yesAdvancement of science, 2022
Exploring high‐safety but convenient encryption and decryption technologies to combat threats of information leakage is urgently needed but remains a great challenge.
Dong Li   +9 more
semanticscholar   +1 more source

On the Image Encryption Algorithm Based on the Chaotic System, DNA Encoding, and Castle

open access: yesIEEE Access, 2021
Hundreds of image encryption algorithms have been developed for the security and integrity of images through the combination of DNA computing and chaotic maps.
Nadeem Iqbal   +6 more
doaj   +1 more source

Program for Simulation and Testing of Apply Cryptography of Advance Encryption Standard (AES) Algorithm with Rivest-Shamir-Adleman (RSA) Algorithm for Good Performance [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2022
Nowadays, information security management systems are important parts of managing a system for better handling of the information security. In scenarios and situations where safety management is done by managing protection of malwares, it is important to
Santi Pattanavichai
doaj   +1 more source

Analysis of common attacks in LDPCC-based public-key cryptosystems [PDF]

open access: yes, 2003
We analyze the security and reliability of a recently proposed class of public-key cryptosystems against attacks by unauthorized parties who have acquired partial knowledge of one or more of the private key components and/or of the plaintext.
D. Saad   +17 more
core   +2 more sources

Home - About - Disclaimer - Privacy