Results 21 to 30 of about 60,215 (284)

Non-malleable encryption: simpler, shorter, stronger [PDF]

open access: yes, 2016
In a seminal paper, Dolev et al. [15] introduced the notion of non-malleable encryption (NM-CPA). This notion is very intriguing since it suffices for many applications of chosen-ciphertext secure encryption (IND-CCA), and, yet, can be generically built ...
B Shen   +26 more
core   +2 more sources

Gallium Nitride Metalens for Image Decryption

open access: yesCrystals, 2021
As the demand for secure digital data continues to increase, image encryption and decryption have recently received tremendous attention. The rapid development of ultrathin metasurfaces has mainly been driven by the desire for the introduction of novel ...
Meng-Hsin Chen, Jia-Ying Li, Vin-Cent Su
doaj   +1 more source

Analysis of common attacks in LDPCC-based public-key cryptosystems [PDF]

open access: yes, 2003
We analyze the security and reliability of a recently proposed class of public-key cryptosystems against attacks by unauthorized parties who have acquired partial knowledge of one or more of the private key components and/or of the plaintext.
D. Saad   +17 more
core   +2 more sources

Hybrid Technique for Cyber-Physical Security in Cloud-Based Smart Industries

open access: yesSensors, 2022
New technologies and trends in industries have opened up ways for distributed establishment of Cyber-Physical Systems (CPSs) for smart industries. CPSs are largely based upon Internet of Things (IoT) because of data storage on cloud servers which poses ...
Deepak Garg   +5 more
doaj   +1 more source

Roadmap on optical security [PDF]

open access: yes, 2016
Postprint (author's final ...
Javidi, Bahram   +2 more
core   +2 more sources

Encryption of a Message by HillAli Cipher and Security of Routing Path by DSR in Wireless Sensor Network

open access: yesJournal of Communications Software and Systems
A Wireless Sensor Network (WSN) is a collection of sensors that communicate or track a specific object. It is used in many fields of war, architecture, or espionage, but the wireless sensor network faces challenges in securing the path or the message ...
Haneen Mohammed Hussein   +2 more
doaj   +1 more source

ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement [PDF]

open access: yes, 2019
While many tailor made card game protocols are known, the vast majority of those suffer from three main issues: lack of mechanisms for distributing financial rewards and punishing cheaters, lack of composability guarantees and little flexibility ...
A Barnett   +16 more
core   +2 more sources

Image quality and security through nonlinear joint transform encryption [PDF]

open access: yes, 2016
Postprint (published ...
Millán Garcia-Varela, M. Sagrario   +2 more
core   +1 more source

DeCrypt: a 3DES inspired optimised cryptographic algorithm

open access: yesJournal of Ambient Intelligence and Humanized Computing, 2022
Triple Data Encryption Standard (also known as 3DES) is a symmetric encryption algorithm. European Traffic Management System popularly uses 3DES for authentication and encryption. However, as per a draft published by NIST in 2018, 3DES is officially being retired and not suggested to use for new applications.
Deepraj Chowdhury   +6 more
openaire   +2 more sources

Survey and Benchmark of Block Ciphers for Wireless Sensor Networks [PDF]

open access: yes, 2006
Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without ...
Doumen, J.M., Hartel, P.H., Law, Y.W.
core   +3 more sources

Home - About - Disclaimer - Privacy