Results 21 to 30 of about 286,982 (344)

Design of Nonlinear Component of Block Cipher Using Gravesian Octonion Integers

open access: yesIEEE Access, 2023
Being the only nonlinear component in many cryptosystems, an S-box is an integral part of modern symmetric ciphering techniques that creates randomness and increases confidentiality at the substitution stage of the encryption.
Muhammad Irfan   +5 more
doaj   +1 more source

Real-time chaotic video encryption based on multithreaded parallel confusion and diffusion [PDF]

open access: yesInformation Sciences 666, 120420 (2024), 2023
Due to the strong correlation between adjacent pixels, most image encryption schemes perform multiple rounds of confusion and diffusion to protect the image against attacks. Such operations, however, are time-consuming, cannot meet the real-time requirements of video encryption.
arxiv   +1 more source

Secure and Private Implementation of Dynamic Controllers Using Semi-Homomorphic Encryption [PDF]

open access: yes, 2019
This paper presents a secure and private implementation of linear time-invariant dynamic controllers using Paillier's encryption, a semi-homomorphic encryption method.
Farokhi, Farhad   +2 more
core   +2 more sources

A Color Image Encryption Using Dynamic DNA and 4-D Memristive Hyper-Chaos

open access: yesIEEE Access, 2019
In this paper, a color image encryption is proposed based on the dynamic DNA and the 4-D memristive hyper-chaos. First, chaotic matrices are generated from the 4-D memristive hyper-chaos by using the plain image, the salt key, and control parameters ...
Zhentao Liu   +3 more
doaj   +1 more source

Comparative evaluation of different methods of "Homomorphic Encryption" and "Traditional Encryption" on a dataset with current problems and developments [PDF]

open access: yesarXiv, 2022
A database is a prime target for cyber-attacks as it contains confidential, sensitive, or protected information. With the increasing sophistication of the internet and dependencies on internet data transmission, it has become vital to be aware of various encryption technologies and trends. It can assist in safeguarding private information and sensitive
arxiv  

Blind Functional Encryption [PDF]

open access: yes, 2020
Functional encryption (FE) gives the power to retain control of sensitive information and is particularly suitable in several practical real-world use cases. Using this primitive, anyone having a specific functional decryption key (derived from some master secret key) could only obtain the evaluation of an authorized function f over a message m, given ...
Canard, Sébastien   +2 more
openaire   +4 more sources

A Practical Public Key Encryption Scheme Based on Learning Parity With Noise

open access: yesIEEE Access, 2018
To protect cyber security and privacy, it is critical to design security and practical public key encryption schemes. Today, big data and cloud computing bring not only unprecedented opportunities but also fundamental security challenges.
Zhimin Yu   +4 more
doaj   +1 more source

Intrinsic Random Optical Features of the Electronic Packages as Physical Unclonable Functions for Internet of Things Security

open access: yesAdvanced Photonics Research, 2022
The increasing security threat is a serious challenge to the internet of things (IoT). Hardware‐based security primitive is an essential and powerful way to protect IoT devices from various attacks. But most of the current security hardwares are based on
Qian Li   +7 more
doaj   +1 more source

Quantum fully homomorphic encryption scheme based on universal quantum circuit [PDF]

open access: yesQuantum Information Processing, Volume 14, Issue 8 (2015), Page 2749-2759, 2014
Fully homomorphic encryption enables arbitrary computation on encrypted data without decrypting the data. Here it is studied in the context of quantum information processing. Based on universal quantum circuit, we present a quantum fully homomorphic encryption (QFHE) scheme, which permits arbitrary quantum transformation on an encrypted data.
arxiv   +1 more source

Owner Specified Excessive Access Control for Attribute Based Encryption

open access: yesIEEE Access, 2016
Attribute-based encryption (ABE) has emerged as a promising solution for access control to diverse set of users in cloud computing systems. Policy can just specify whether (or not) any specific user should be given access to data, but it lacks to provide
Fawad Khan, Hui Li, Liangxuan Zhang
doaj   +1 more source

Home - About - Disclaimer - Privacy