Results 1 to 10 of about 11,121 (81)

Adaptive Color Image Encryption Scheme Based on Multiple Distinct Chaotic Maps and DNA Computing

open access: yesMathematics, 2022
In this paper, we propose an adaptive encryption scheme for color images using Multiple Distinct Chaotic Maps (MDCM) and DNA computing. We have chosen three distinct chaotic maps, including a 2D-Henon map, a Tent map, and a Logistic map, to separately ...
Shaista Mansoor   +5 more
doaj   +1 more source

Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol [PDF]

open access: yes, 2020
A fully homomorphic encryption system hides data from unauthorized parties while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful ...
Bonsma-Fisher, Kent   +6 more
core   +2 more sources

Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Statistical attacks form an important class of attacks against block ciphers. By analyzing the distribution of the statistics involved in the attack, cryptanalysts aim at providing a good estimate of the data complexity of the attack.
Céline Blondeau, Kaisa Nyberg
doaj   +1 more source

PPDC: A Privacy-Preserving Distinct Counting Scheme for Mobile Sensing

open access: yesApplied Sciences, 2019
Mobile sensing mines group information through sensing and aggregating users’ data. Among major mobile sensing applications, the distinct counting problem aiming to find the number of distinct elements in a data stream with repeated elements, is ...
Xiaochen Yang   +3 more
doaj   +1 more source

Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures [PDF]

open access: yes, 2006
Content-Based Publish/Subscribe (CBPS) is an interaction model where the interests of subscribers are stored in a content-based forwarding infrastructure to guide routing of notifications to interested parties.
Raiciu, C, Rosenblum, DS
core   +1 more source

Quantitative Evaluation of Chaotic CBC Mode of Operation [PDF]

open access: yes, 2016
The cipher block chaining (CBC) block cipher mode of operation presents a very popular way of encrypting which is used in various applications. In previous research work, we have mathematically proven that, under some conditions, this mode of operation ...
Abidi, Abdessalem   +4 more
core   +3 more sources

On Known-Plaintext Attacks to a Compressed Sensing-based Encryption: A Quantitative Analysis [PDF]

open access: yes, 2015
Despite the linearity of its encoding, compressed sensing may be used to provide a limited form of data protection when random encoding matrices are used to produce sets of low-dimensional measurements (ciphertexts).
Cambareri, Valerio   +4 more
core   +2 more sources

POPE: Partial Order Preserving Encoding [PDF]

open access: yes, 2016
Recently there has been much interest in performing search queries over encrypted data to enable functionality while protecting sensitive data. One particularly efficient mechanism for executing such queries is order-preserving encryption/encoding (OPE ...
Apon, Daniel   +3 more
core   +2 more sources

Cryptanalysis of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables [PDF]

open access: yes, 2007
This paper studies the security of a recently-proposed MPEG-video encryption scheme based on secret Huffman tables. Our cryptanalysis shows that: 1) the key space of the encryption scheme is not sufficiently large against divide-and-conquer (DAC) attack ...
A. Uhl   +10 more
core   +3 more sources

Cryptanalysis of a family of self-synchronizing chaotic stream ciphers [PDF]

open access: yes, 2009
Unimodal maps have been broadly used as a base of new encryption strategies. Recently, a stream cipher has been proposed in the literature, whose keystream is basically a symbolic sequence of the (one-parameter) logistic map or of the tent map.
Alvarez, Gonzalo   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy