Results 21 to 30 of about 60,215 (284)
Non-malleable encryption: simpler, shorter, stronger [PDF]
In a seminal paper, Dolev et al. [15] introduced the notion of non-malleable encryption (NM-CPA). This notion is very intriguing since it suffices for many applications of chosen-ciphertext secure encryption (IND-CCA), and, yet, can be generically built ...
B Shen +26 more
core +2 more sources
Gallium Nitride Metalens for Image Decryption
As the demand for secure digital data continues to increase, image encryption and decryption have recently received tremendous attention. The rapid development of ultrathin metasurfaces has mainly been driven by the desire for the introduction of novel ...
Meng-Hsin Chen, Jia-Ying Li, Vin-Cent Su
doaj +1 more source
Analysis of common attacks in LDPCC-based public-key cryptosystems [PDF]
We analyze the security and reliability of a recently proposed class of public-key cryptosystems against attacks by unauthorized parties who have acquired partial knowledge of one or more of the private key components and/or of the plaintext.
D. Saad +17 more
core +2 more sources
Hybrid Technique for Cyber-Physical Security in Cloud-Based Smart Industries
New technologies and trends in industries have opened up ways for distributed establishment of Cyber-Physical Systems (CPSs) for smart industries. CPSs are largely based upon Internet of Things (IoT) because of data storage on cloud servers which poses ...
Deepak Garg +5 more
doaj +1 more source
Roadmap on optical security [PDF]
Postprint (author's final ...
Javidi, Bahram +2 more
core +2 more sources
A Wireless Sensor Network (WSN) is a collection of sensors that communicate or track a specific object. It is used in many fields of war, architecture, or espionage, but the wireless sensor network faces challenges in securing the path or the message ...
Haneen Mohammed Hussein +2 more
doaj +1 more source
ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement [PDF]
While many tailor made card game protocols are known, the vast majority of those suffer from three main issues: lack of mechanisms for distributing financial rewards and punishing cheaters, lack of composability guarantees and little flexibility ...
A Barnett +16 more
core +2 more sources
Image quality and security through nonlinear joint transform encryption [PDF]
Postprint (published ...
Millán Garcia-Varela, M. Sagrario +2 more
core +1 more source
DeCrypt: a 3DES inspired optimised cryptographic algorithm
Triple Data Encryption Standard (also known as 3DES) is a symmetric encryption algorithm. European Traffic Management System popularly uses 3DES for authentication and encryption. However, as per a draft published by NIST in 2018, 3DES is officially being retired and not suggested to use for new applications.
Deepraj Chowdhury +6 more
openaire +2 more sources
Survey and Benchmark of Block Ciphers for Wireless Sensor Networks [PDF]
Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without ...
Doumen, J.M., Hartel, P.H., Law, Y.W.
core +3 more sources

