Results 31 to 40 of about 93,492 (364)
Protecting confidential high speed optical signal transmission at the lowest physical layer is a critical challenge for modern fiber-optic communication systems.
Zhensen Gao +8 more
semanticscholar +1 more source
Quantum Encryption and Decryption in IBMQ Systems using Quantum Permutation Pad
We present a functioning implementation of Kuang et al.’s Quantum Permutation Pad (QPP) using the Qiskit developmental kit on the currently available International Business Machines (IBM) quantum computers. For this implementation, we use a pad with 28 2-
Maria Perepechaenko, Randy Kuang
semanticscholar +1 more source
Fluorescent hydrogels have recently become one of the most prominent materials for smart confidential information protection. But it is still quite challenging to develop a 3D anticounterfeiting platform with on‐demand information decryption and ...
H.-Y. Qiu +8 more
semanticscholar +1 more source
IMCRYPTO: An In-Memory Computing Fabric for AES Encryption and Decryption [PDF]
This article proposes IMCRYPTO, an in-memory computing (IMC) fabric for accelerating advanced encryption standard (AES) encryption and decryption.
D. Reis, Haoran Geng, M. Niemier, X. Hu
semanticscholar +1 more source
Image Encryption Using Block Cipher Based Serpent Algorithm [PDF]
In an encryption scheme, the message or information, referred to as plaintext, is encrypted using an encryption algorithm, generating cipher textthat can only be read if decrypted.A proposal algorithm forimages protectionis depending on the block cipher ...
Yossra Hussain Ali +1 more
doaj +1 more source
Chaotic-Map Based Encryption for 3D Point and 3D Mesh Fog Data in Edge Computing
Recent decades have seen dramatic development and adoption of digital technology. This technological advancement generates a large amount of critical data that must be safeguarded.
K. R. Raghunandan +4 more
doaj +1 more source
Efficient public-key cryptography with bounded leakage and tamper resilience [PDF]
We revisit the question of constructing public-key encryption and signature schemes with security in the presence of bounded leakage and tampering memory attacks.
A Faonio +46 more
core +2 more sources
Proposed Hybrid Approach of Stream Cipher base on Selector of Encryption operation and Key Symmetric translate [PDF]
A stream cipher is a method of encrypting text (to produce cipher text) in which a cryptographic key and algorithm are applied to each binary digit in a data stream, one bit at a time. This method is not much used in modern cryptography.
Alaa Kadim Farhan
doaj +1 more source
A Wireless Sensor Network (WSN) is a collection of sensors that communicate or track a specific object. It is used in many fields of war, architecture, or espionage, but the wireless sensor network faces challenges in securing the path or the message ...
Haneen Mohammed Hussein +2 more
doaj +1 more source
A Concealed Based Approach for Secure Transmission in Advanced Metering Infrastructure
The smart grid has an important subsystem known as the Advanced Metering Infrastructure (AMI), responsible for measuring customer consumption of electricity.
Otisitswe Kebotogetse +2 more
doaj +1 more source

