Results 21 to 30 of about 58,616 (313)
Image encryption system based on a nonlinear joint transform correlator for the simultaneous authentication of two users [PDF]
We propose a new encryption system based on a nonlinear joint transform correlator (JTC) using the information of two biometrics (one digital fingerprint for each user) as security keys of the encryption system.
Millán Garcia-Varela, M. Sagrario+2 more
core +2 more sources
An RGB Image Cipher Using Chaotic Systems, 15-Puzzle Problem and DNA Computing
The application of confusion and diffusion processes on the three individual components of an RGB image is not secure and efficient, so this problem needs to be addressed.
Nadeem Iqbal+5 more
doaj +1 more source
Crypto Model of Real-Time Audio Streaming Across Paired Mobile Devices [PDF]
The progressive usage of the Internet of Things (IoT) and smartphone ubiquity is inducing attention, importance and interest in leveraging smartphones for deploying and running sophisticated mobile applications. Modern smartphones have good connectivity,
E. Ibam, O. Boyinbode, I. Ayelabowo
doaj +1 more source
Improving the security of LSB image steganography
Steganography is the technique of hiding secret data (message) within any media such as digital color image. In this paper we will merge steganography process with cryptography process in order to increase the security of the proposed method.
Jamil Al-Azzeh+3 more
doaj +1 more source
Efficient public-key cryptography with bounded leakage and tamper resilience [PDF]
We revisit the question of constructing public-key encryption and signature schemes with security in the presence of bounded leakage and tampering memory attacks.
A Faonio+46 more
core +2 more sources
AES Algorithm: Encryption and Decryption [PDF]
Advanced Encryption Standard AES algorithm is one of the most common and widely used symmetric block cipher algorithm. This algorithm has its own particular structure to encrypt and decrypt sensitive data and is applied in hardware and software, all over the world.
Shivangi Wadehra+2 more
openaire +2 more sources
General Impossibility of Group Homomorphic Encryption in the Quantum World [PDF]
Group homomorphic encryption represents one of the most important building blocks in modern cryptography. It forms the basis of widely-used, more sophisticated primitives, such as CCA2-secure encryption or secure multiparty computation.
Armknecht, Frederik+3 more
core +10 more sources
Ad Hoc Multi-Input Functional Encryption [PDF]
Consider sources that supply sensitive data to an aggregator. Standard encryption only hides the data from eavesdroppers, but using specialized encryption one can hope to hide the data (to the extent possible) from the aggregator itself.
Agrawal, Shweta+5 more
core +2 more sources
Tissue factor: mechanisms of decryption [PDF]
It is generally believed that only a small fraction of the tissue factor (TF) found on cell surfaces is active whereas the vast majority is cryptic in coagulation. It is unclear how cryptic TF differs from the coagulant active TF or potential mechanisms involved in transformation of cryptic TF to the coagulant active form.
Hema Kothari+2 more
openaire +3 more sources
The topic of Aadhaar links with the Indians in various ways. Aadhaar can be thought of as a digital infrastructure that has been an enabler and disabler in its ways. I exploresome of these ways through my article. I tried to question the proposition of introducing Aadhaar and carefully studied its theoretical bene?ts. Furthermore, I wish to explore the
openaire +3 more sources