Results 311 to 320 of about 478,748 (354)
Some of the next articles are maybe not open access.

OpenFHE: Open-Source Fully Homomorphic Encryption Library

IACR Cryptology ePrint Archive, 2022
Fully Homomorphic Encryption (FHE) is a powerful cryptographic primitive that enables performing computations over encrypted data without having access to the secret key.
A. Al Badawi   +20 more
semanticscholar   +1 more source

Encrypted PRNG by Logic Encryption

2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), 2020
In this paper, the authors consider such an area of information security as logical encryption. Logical encryption is one of the most important methods of hardware protection, which introduces additional key inputs into a given combinational scheme to protect functionality from unauthorized use.
Marina A. Kiryakina   +2 more
openaire   +1 more source

Color-Gray Multi-Image Hybrid Compression–Encryption Scheme Based on BP Neural Network and Knight Tour

IEEE Transactions on Cybernetics, 2023
In the research of multi-image encryption (MIE), the image type and size are important factors that limit the algorithm design. For this reason, the multi-image (MI) hybrid encryption algorithm that can flexibly encrypt color images and grayscale images ...
Xinyu Gao   +3 more
semanticscholar   +1 more source

Image encryption: Generating visually meaningful encrypted images

Information Sciences, 2015
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Long Bao, Yicong Zhou
openaire   +2 more sources

A Parallel Color Image Encryption Algorithm Based on a 2-D Logistic-Rulkov Neuron Map

IEEE Internet of Things Journal
Images are widely used in social networks, necessitating efficient and secure transmission, especially in bandwidth-constrained environments. This article aims to develop a color image encryption algorithm that enhances security while optimizing ...
Suo Gao   +9 more
semanticscholar   +1 more source

Double Lock Label Based on Thermosensitive Polymer Hydrogels for Information Camouflage and Multi-level Encryption.

Angewandte Chemie, 2022
Developing extra safety encryption technologies to prevent information leakage and combat fakes is highly demanded but challenging. Herein, we propose a "double lock" strategy based on both lower critical solution temperature (LCST) and upper critical ...
Dongyang Lou   +9 more
semanticscholar   +1 more source

A Time‐Dependent Fluorescent Hydrogel for “Time‐Lock” Information Encryption

Advanced Functional Materials, 2022
Information encryption has become increasingly important in recent years; however, information encryption materials, especially those encrypting on a time scale, are still in fancy. Herein, a “time‐lock” information encryption material is developed based
Qian Wang   +5 more
semanticscholar   +1 more source

Encryption

ACM SIGSAC Review, 1992
As we place more trust in our computer systems, we must continue to find more ways to make our systems deserving of that trust. Encryption is one of those ways.
openaire   +2 more sources

Public-Key Encryption

1999
Public-key algorithms use a secret element and a public element to their code. One of the main algorithms is RSA. Compared with DES it is relatively slow but it has the advantage that users can choose their own key whenever they need one. The most commonly used public-key cryptosystems are covered in the next sections.
openaire   +1 more source

Home - About - Disclaimer - Privacy