Results 21 to 30 of about 62,040 (316)

Survey on Modern Cryptography

open access: yesJournal of Kufa for Mathematics and Computer, 2021
Security is one of the significant difficulties that individuals are confronting when the information exchanged over the internet in today's world. Cryptography is the way to achieve security of network or data by hiding the important information from ...
Mustafa Abd Zaid, Soukaena Hassan
doaj   +1 more source

A New Cryptography Method Based on Hill and Rail Fence Algorithms

open access: yesDiyala Journal of Engineering Sciences, 2017
Encryption has a great benefit, it provides privacy and security of all concepts of data transmitted across open networks. An urgent need for methods of strong encryption has become important with the rapid development of the computer, it detract from ...
Ashty M. Aaref
doaj   +1 more source

A Novel and Efficient Multiple RGB Images Cipher Based on Chaotic System and Circular Shift Operations

open access: yesIEEE Access, 2020
In real time scenarios, the single image encryption schemes are not that efficient when a bunch of color images is to be encrypted. This problem should be addressed due to computational cost incurred by multiple executions of single color-image ...
Muhammad Hanif   +6 more
doaj   +1 more source

Color Image Encryption Algorithm Based on Hyper-Chaos and DNA Computing

open access: yesIEEE Access, 2020
In this study, a novel technique using a hyper chaotic dynamical system and DNA computing has been designed with high plaintext sensitivity. In order to reduce cost, a selection procedure using tent map has been employed for generating different key ...
M. G. Abbas Malik   +3 more
doaj   +1 more source

A Proposed Fully Homomorphic for Securing Cloud Banking Data at Rest

open access: yesUHD Journal of Science and Technology, 2020
Fully homomorphic encryption (FHE) reaped the importance and amazement of most researchers and followers in data encryption issues, as programs are allowed to perform arithmetic operations on encrypted data without decrypting it and obtain results ...
Zana Thalage Omar, Fadhil Salman Abed
doaj   +1 more source

FOUR STAGE SECURITY ALGORITHM FOR DATA TRANSFER TO IMPROVE SECURITY IN MANET

open access: yesICTACT Journal on Communication Technology, 2022
Mobile Ad hoc Network (MANET) regarded to be a group of mobile nodes that can communicate with others in the absence of network infrastructure. MANET is at high risk due to its basic features, such as peer-to-peer (P2P) architecture; wireless shared ...
C. Chandra Prabha   +1 more
doaj   +1 more source

Area-Time Efficient Hardware Architecture for CRYSTALS-Kyber

open access: yesApplied Sciences, 2022
This paper presents a novel area-time efficient hardware architecture of the lattice-based CRYSTALS-Kyber, which has entered the third round of the post-quantum cryptography standardization competition hosted by the National Institute of Standards and ...
Tuy Tan Nguyen   +3 more
doaj   +1 more source

A kind of design and implementation about safety RTU

open access: yesDianzi Jishu Yingyong, 2018
This paper introduces the whole structure design of RTU, describes in detail the realization method of telemetry acquisition module, signal acquisition module, control module, encryption/ decryption module and communication module.
Han Zaifeng, Zhao Limin
doaj   +1 more source

FPGA implementation of hardware architecture with AES encryptor using sub-pipelined S-box techniques for compact applications

open access: yesAutomatika, 2020
Advanced Encryption Standard (AES) is a thriving cryptographic algorithm that can be utilized to guarantee security in electronic information. It remains to uphold to be resistive from most of the attacks.
C. Arul Murugan   +2 more
doaj   +1 more source

On the Image Encryption Algorithm Based on the Chaotic System, DNA Encoding, and Castle

open access: yesIEEE Access, 2021
Hundreds of image encryption algorithms have been developed for the security and integrity of images through the combination of DNA computing and chaotic maps.
Nadeem Iqbal   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy