Results 31 to 40 of about 11,196 (120)
Security of signed ELGamal encryption [PDF]
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against the adaptive chosen ciphertext attack, in which an attacker can freely use
Jakobsson, Markus, Schnorr, Claus Peter
core
Mobile Microgrids: Concepts, Key Technologies, Business Models, Applications and Prospects
Our study explores MMG concepts, key technologies, business models and applications, illustrating their impact on improving the flexible ADN operation. This study emphasises not only the practical importance of MMGs but also their pivotal role in reshaping the future landscape of energy delivery, offering valuable insights for researchers, policymakers
Tao Ding +5 more
wiley +1 more source
Impact of Cyberphysical Attacks on Load Tap Changers and Distribution System Voltage Stability
In this paper, we analysed the impact of a cyberphysical attack manipulating the operation of the LTC. In addition, we analysed the effect of load drop and PV while LTC is being manipulated. The cyber vulnerabilities leading to the attack were explored. ABSTRACT Load tap changers (LTCs) play a critical role in voltage regulation, and their manipulation
Anas AlMajali +4 more
wiley +1 more source
Barrel Shifter Physical Unclonable Function Based Encryption
Physical Unclonable Functions (PUFs) are circuits designed to extract physical randomness from the underlying circuit. This randomness depends on the manufacturing process.
Dee, Timothy +2 more
core +1 more source
Summary Monoterpene indole alkaloids (MIA) are a diverse class of plant natural products produced by a subset of lineages within the Asterid clade of eudicots. The diversity of MIAs provides a unique opportunity to study not only the evolution of biosynthetic genes but also their regulation.
Chenxin Li +7 more
wiley +1 more source
Safe and Quickest Medical Image Encryption Using Logistic Map Derived S‐Boxes and Galois Field
The pseudorandomness, simplicity of use, and extreme sensitivity to even the slightest change in the initial value and handling parameters make chaotic maps attractive. The use of medical imaging to diagnose illnesses has grown in significance. These photographs need strong security measures because they are exchanged over public networks.
Mahwish Bano +5 more
wiley +1 more source
Correspondence through email has become a very significant way of communication at workplaces. Information of most kinds such as text, video and audio can be shared through email, the most common being text.
Manjunath, Naidele Katrumane
core +1 more source
Ovarian cancer continues to pose a major diagnostic challenge, as early‐stage disease often presents with subtle and heterogeneous imaging characteristics that limit the effectiveness of single‐modality analysis. In response to this challenge, this study proposes a novel hybrid deep learning framework for the early detection and classification of ...
Umesh Kumar Lilhore +9 more
wiley +1 more source
Variations of the McEliece Cryptosystem
Two variations of the McEliece cryptosystem are presented. The first one is based on a relaxation of the column permutation in the classical McEliece scrambling process.
Alain Couvreur +16 more
core +1 more source
A connection between cryptography and polynomial functions is extremely significant. Mathematical performance of polynomials helps to enhance the cryptographic primitives, which are trustworthy as well as straightforward representation tools, in everyday use. In this research, explicit topological sequences Qf which correspond to degree‐based, distance‐
Mohammad Mazyad Hazzazi +5 more
wiley +1 more source

