Results 31 to 40 of about 93,492 (364)

Experimental demonstration of synchronous privacy enhanced chaotic temporal phase en/decryption for high speed secure optical communication.

open access: yesOptics Express, 2022
Protecting confidential high speed optical signal transmission at the lowest physical layer is a critical challenge for modern fiber-optic communication systems.
Zhensen Gao   +8 more
semanticscholar   +1 more source

Quantum Encryption and Decryption in IBMQ Systems using Quantum Permutation Pad

open access: yesJournal of Communications, 2022
We present a functioning implementation of Kuang et al.’s Quantum Permutation Pad (QPP) using the Qiskit developmental kit on the currently available International Business Machines (IBM) quantum computers. For this implementation, we use a pad with 28 2-
Maria Perepechaenko, Randy Kuang
semanticscholar   +1 more source

Programming Multistate Aggregation‐Induced Emissive Polymeric Hydrogel into 3D Structures for On‐Demand Information Decryption and Transmission

open access: yesAdvanced Intelligent Systems, 2021
Fluorescent hydrogels have recently become one of the most prominent materials for smart confidential information protection. But it is still quite challenging to develop a 3D anticounterfeiting platform with on‐demand information decryption and ...
H.-Y. Qiu   +8 more
semanticscholar   +1 more source

IMCRYPTO: An In-Memory Computing Fabric for AES Encryption and Decryption [PDF]

open access: yesIEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2021
This article proposes IMCRYPTO, an in-memory computing (IMC) fabric for accelerating advanced encryption standard (AES) encryption and decryption.
D. Reis, Haoran Geng, M. Niemier, X. Hu
semanticscholar   +1 more source

Image Encryption Using Block Cipher Based Serpent Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2016
In an encryption scheme, the message or information, referred to as plaintext, is encrypted using an encryption algorithm, generating cipher textthat can only be read if decrypted.A proposal algorithm forimages protectionis depending on the block cipher ...
Yossra Hussain Ali   +1 more
doaj   +1 more source

Chaotic-Map Based Encryption for 3D Point and 3D Mesh Fog Data in Edge Computing

open access: yesIEEE Access, 2023
Recent decades have seen dramatic development and adoption of digital technology. This technological advancement generates a large amount of critical data that must be safeguarded.
K. R. Raghunandan   +4 more
doaj   +1 more source

Efficient public-key cryptography with bounded leakage and tamper resilience [PDF]

open access: yes, 2016
We revisit the question of constructing public-key encryption and signature schemes with security in the presence of bounded leakage and tampering memory attacks.
A Faonio   +46 more
core   +2 more sources

Proposed Hybrid Approach of Stream Cipher base on Selector of Encryption operation and Key Symmetric translate [PDF]

open access: yesEngineering and Technology Journal, 2011
A stream cipher is a method of encrypting text (to produce cipher text) in which a cryptographic key and algorithm are applied to each binary digit in a data stream, one bit at a time. This method is not much used in modern cryptography.
Alaa Kadim Farhan
doaj   +1 more source

Encryption of a Message by HillAli Cipher and Security of Routing Path by DSR in Wireless Sensor Network

open access: yesJournal of Communications Software and Systems
A Wireless Sensor Network (WSN) is a collection of sensors that communicate or track a specific object. It is used in many fields of war, architecture, or espionage, but the wireless sensor network faces challenges in securing the path or the message ...
Haneen Mohammed Hussein   +2 more
doaj   +1 more source

A Concealed Based Approach for Secure Transmission in Advanced Metering Infrastructure

open access: yesIEEE Access, 2022
The smart grid has an important subsystem known as the Advanced Metering Infrastructure (AMI), responsible for measuring customer consumption of electricity.
Otisitswe Kebotogetse   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy