Results 21 to 30 of about 327,487 (331)

Chaotic image encryption using hopfield and hindmarsh–rose neurons implemented on FPGA [PDF]

open access: yes, 2020
Chaotic systems implemented by artificial neural networks are good candidates for data encryption. In this manner, this paper introduces the cryptographic application of the Hopfield and the Hindmarsh–Rose neurons.
Cruz-Vega, Israel   +7 more
core   +2 more sources

Digital Key Distribution Protected by Recorded Quantum Noise

open access: yesIEEE Access
A new digital key distribution and encryption system for broad use is presented. It offers affordable perfect security for in-transit digital communications and is quantum-resistant.
Geraldo A. A
doaj   +1 more source

Error Function Attack of chaos synchronization based encryption schemes

open access: yes, 2003
Different chaos synchronization based encryption schemes are reviewed and compared from the practical point of view. As an efficient cryptanalysis tool for chaos encryption, a proposal based on the Error Function Attack is presented systematically and ...
Hu, Gang   +3 more
core   +1 more source

Attribute‐based encryption implies identity‐based encryption [PDF]

open access: yesIET Information Security, 2017
In this study, the author formally proves that designing attribute‐based encryption schemes cannot be easier than designing identity‐based encryption schemes. In more detail, they show how an attribute‐based encryption scheme which admits, at least, and policies can be combined with a ...
openaire   +3 more sources

Uncloneable encryption

open access: yesQuantum Information and Computation, 2003
Quantum states cannot be cloned. I show how to extend this property to classical messages encoded using quantum states, a task I call ``uncloneable encryption.'' An uncloneable encryption scheme has the property that an eavesdropper Eve not only cannot read the encrypted message, but she cannot copy it down for later decoding.
openaire   +2 more sources

Encrypted data processing with Homomorphic Re-Encryption

open access: yesInformation Sciences, 2017
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Ding, Wenxiu   +3 more
openaire   +3 more sources

Enhancing IoT Data Security: Using the Blockchain to Boost Data Integrity and Privacy

open access: yesIoT
The Internet of Things (IoT) is a technology that can connect billions of devices or “things” to other devices (machine to machine) or even to people via an existing infrastructure.
Ali Eghmazi   +3 more
doaj   +1 more source

Cryptanalyzing an Image-Scrambling Encryption Algorithm of Pixel Bits

open access: yes, 2017
Position scrambling (permutation) is widely used in multimedia encryption schemes and some international encryption standards, such as the Data Encryption Standard and the Advanced Encryption Standard.
Li, Chengqing, Lin, Dongdong, Lü, Jinhu
core   +1 more source

Order-Revealing Encryption and the Hardness of Private Learning [PDF]

open access: yes, 2015
An order-revealing encryption scheme gives a public procedure by which two ciphertexts can be compared to reveal the ordering of their underlying plaintexts. We show how to use order-revealing encryption to separate computationally efficient PAC learning
A Beimel   +27 more
core   +2 more sources

On the Design of Perceptual MPEG-Video Encryption Algorithms [PDF]

open access: yes, 2006
In this paper, some existing perceptual encryption algorithms of MPEG videos are reviewed and some problems, especially security defects of two recently proposed MPEG-video perceptual encryption schemes, are pointed out.
Bhargava, Bharat   +4 more
core   +6 more sources

Home - About - Disclaimer - Privacy