Results 51 to 60 of about 299,742 (318)

A Novel Latin Square Image Cipher

open access: yes, 2012
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color images. Our contributions to the image encryption community include 1) we develop new Latin square image encryption primitives including Latin Square ...
Aaronson   +45 more
core   +1 more source

A New Algorithm to Encryption and Compression Image Data File [PDF]

open access: yesمجلة التربية والعلم, 2011
In this research algorithm to encryption and image compression data file was developed. This algorithm is a result of merge between RSA algorithm for encryption and Morlet Wavelet which is used for image data file compression.
Riyad Mubarak Abdullah
doaj   +1 more source

A stepwise emergence of evolution in the RNA world

open access: yesFEBS Letters, EarlyView.
How did biological evolution emerge from chemical reactions? This perspective proposes a gradual scenario of self‐organization among RNA molecules, where catalytic feedback on random mixtures plays the central role. Short oligomers cross‐ligate, and self‐assembly enables heritable variations. An event of template‐externalization marks the transition to
Philippe Nghe
wiley   +1 more source

Block encryption of quantum messages [PDF]

open access: yes, 2018
In modern cryptography, block encryption is a fundamental cryptographic primitive. However, it is impossible for block encryption to achieve the same security as one-time pad.
Liang, Min, Yang, Li
core   +1 more source

AES-CBC Software Execution Optimization

open access: yes, 2012
With the proliferation of high-speed wireless networking, the necessity for efficient, robust and secure encryption modes is ever increasing. But, cryptography is primarily a computationally intensive process.
Doma, Jayramsingh   +2 more
core   +1 more source

Secret Channel using Video Steganography

open access: yesJOIV: International Journal on Informatics Visualization, 2017
Video steganography is about hiding the secret message into the video as the cover media. Steganography is a technique use to secure the transmission of secret information or hide their existence.
Lee Kar Yee, Chuah Chai Wen
doaj   +1 more source

Multipath Data Storage by Third-Order Nonlinear Optical Properties in Zinc Oxide Nanostructures

open access: yesApplied Sciences, 2020
Simultaneous activation of multiphotonic absorption and nonlinear optical refraction were employed for developing a multipath load balancing technique assisted by light and zinc oxide nanostructures.
Federico Ortíz-Trejo   +4 more
doaj   +1 more source

B cell mechanobiology in health and disease: emerging techniques and insights into therapeutic responses

open access: yesFEBS Letters, EarlyView.
B cells sense external mechanical forces and convert them into biochemical signals through mechanotransduction. Understanding how malignant B cells respond to physical stimuli represents a groundbreaking area of research. This review examines the key mechano‐related molecules and pathways in B lymphocytes, highlights the most relevant techniques to ...
Marta Sampietro   +2 more
wiley   +1 more source

IoT data encryption algorithm for security [PDF]

open access: yes, 2020
This research project is about encryption simulation for IoT data. It is important to enhance the security system when sending and receiving the IoT data.
Kanaan Ismael, Marwan
core  

Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security [PDF]

open access: yes, 2009
Recently, a variant of proxy re-encryption, named conditional proxy re-encryption (C-PRE), has been introduced. Compared with traditional proxy re-encryption, C-PRE enables the delegator to implement fine-grained delegation of decryption rights, and thus
B. Libert   +15 more
core   +5 more sources

Home - About - Disclaimer - Privacy