Results 1 to 10 of about 229,222 (268)
A Compression Algorithm for DNA Palindrome Compression Technique [PDF]
Data Compression in Cryptography is one of the interesting research topic. The compression process reduces the amount of transferring data as well as storage space which in turn effects the usage of bandwidth.
Suneetha D.+2 more
doaj +1 more source
We provide a provable-security treatment of "robust" encryption. Robustness means it is hard to produce a ciphertext that is valid for two different users. Robustness makes explicit a property that has been implicitly assumed in the past. We argue that it is an essential conjunct of anonymous encryption.
Abdalla, Michel+2 more
openaire +7 more sources
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
With the rapid miniaturization in sensor technology, ruddervator, arduino, and multi-rotor system, drone technology has fascinated researchers in the field of network security.
Saeed Ullah Jan, Habib Ullah Khan
doaj +1 more source
Chaos-Based Image Encryption: Review, Application, and Challenges
Chaos has been one of the most effective cryptographic sources since it was first used in image-encryption algorithms. This paper closely examines the development process of chaos-based image-encryption algorithms from various angles, including symmetric
Bowen Zhang, Lingfeng Liu
semanticscholar +1 more source
Color Image Encryption Through Chaos and KAA Map
The unprecedented growth in production and exchange of multimedia over unsecured channels is overwhelming mathematicians, scientists and engineers to realize secure and efficient cryptographic algorithms. In this paper, a color image encryption algorithm
Wassim Alexan+4 more
semanticscholar +1 more source
Probing 3D chaotic Thomas’ cyclically attractor with multimedia encryption and electronic circuitry [PDF]
This study investigates Thomas’ cyclically symmetric attractor dynamics with mathematical and electronic simulations using a proportional fractional derivative to comprehend the dynamics of a given chaotic system.
NajeebAlam Khan+3 more
doaj +1 more source
Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
In this paper, a new one-dimensional fractional chaotic map is proposed and an image encryption scheme based on parallel DNA coding is designed by using the chaotic map.
Shenli Zhu+3 more
semanticscholar +1 more source
Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing
Chen et al. indicated the inner keyword guessing attack coming from the low entropy of keywords, which eliminates the semantic security of most keyword search schemes.
Raylin Tso+4 more
doaj +1 more source
Cryptography in Qajar Period Passing Through the Traditional Cryptography to the Modern One [PDF]
There have been encrypted connections among human societies for sending confidential messages a long time ago. In the history of Iran also many encryption lines have been used by crypto-writers.
Samad Kavousi Rakati
doaj +1 more source