Results 311 to 320 of about 478,748 (354)
Some of the next articles are maybe not open access.
OpenFHE: Open-Source Fully Homomorphic Encryption Library
IACR Cryptology ePrint Archive, 2022Fully Homomorphic Encryption (FHE) is a powerful cryptographic primitive that enables performing computations over encrypted data without having access to the secret key.
A. Al Badawi +20 more
semanticscholar +1 more source
Encrypted PRNG by Logic Encryption
2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), 2020In this paper, the authors consider such an area of information security as logical encryption. Logical encryption is one of the most important methods of hardware protection, which introduces additional key inputs into a given combinational scheme to protect functionality from unauthorized use.
Marina A. Kiryakina +2 more
openaire +1 more source
IEEE Transactions on Cybernetics, 2023
In the research of multi-image encryption (MIE), the image type and size are important factors that limit the algorithm design. For this reason, the multi-image (MI) hybrid encryption algorithm that can flexibly encrypt color images and grayscale images ...
Xinyu Gao +3 more
semanticscholar +1 more source
In the research of multi-image encryption (MIE), the image type and size are important factors that limit the algorithm design. For this reason, the multi-image (MI) hybrid encryption algorithm that can flexibly encrypt color images and grayscale images ...
Xinyu Gao +3 more
semanticscholar +1 more source
Image encryption: Generating visually meaningful encrypted images
Information Sciences, 2015zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Long Bao, Yicong Zhou
openaire +2 more sources
A Parallel Color Image Encryption Algorithm Based on a 2-D Logistic-Rulkov Neuron Map
IEEE Internet of Things JournalImages are widely used in social networks, necessitating efficient and secure transmission, especially in bandwidth-constrained environments. This article aims to develop a color image encryption algorithm that enhances security while optimizing ...
Suo Gao +9 more
semanticscholar +1 more source
Angewandte Chemie, 2022
Developing extra safety encryption technologies to prevent information leakage and combat fakes is highly demanded but challenging. Herein, we propose a "double lock" strategy based on both lower critical solution temperature (LCST) and upper critical ...
Dongyang Lou +9 more
semanticscholar +1 more source
Developing extra safety encryption technologies to prevent information leakage and combat fakes is highly demanded but challenging. Herein, we propose a "double lock" strategy based on both lower critical solution temperature (LCST) and upper critical ...
Dongyang Lou +9 more
semanticscholar +1 more source
A Time‐Dependent Fluorescent Hydrogel for “Time‐Lock” Information Encryption
Advanced Functional Materials, 2022Information encryption has become increasingly important in recent years; however, information encryption materials, especially those encrypting on a time scale, are still in fancy. Herein, a “time‐lock” information encryption material is developed based
Qian Wang +5 more
semanticscholar +1 more source
ACM SIGSAC Review, 1992
As we place more trust in our computer systems, we must continue to find more ways to make our systems deserving of that trust. Encryption is one of those ways.
openaire +2 more sources
As we place more trust in our computer systems, we must continue to find more ways to make our systems deserving of that trust. Encryption is one of those ways.
openaire +2 more sources
1999
Public-key algorithms use a secret element and a public element to their code. One of the main algorithms is RSA. Compared with DES it is relatively slow but it has the advantage that users can choose their own key whenever they need one. The most commonly used public-key cryptosystems are covered in the next sections.
openaire +1 more source
Public-key algorithms use a secret element and a public element to their code. One of the main algorithms is RSA. Compared with DES it is relatively slow but it has the advantage that users can choose their own key whenever they need one. The most commonly used public-key cryptosystems are covered in the next sections.
openaire +1 more source

