Results 1 to 10 of about 63,618 (275)
Novel Hybrid Public/Private Key Cryptography Based on Perfect Gaussian Integer Sequences [PDF]
This paper proposes a novel hybrid public/private key cryptography scheme based on perfect Gaussian integer sequences (PGISs) of period $N=pq$ . First, a review study of construction degree-4 PGIS is addressed.
Ching-Hsien Hsia +3 more
doaj +2 more sources
Forward-Security in Private-Key Cryptography [PDF]
This paper provides a comprehensive treatment of forward-security in the context of sharedkey based cryptographic primitives, as a practical means to mitigate the damage caused by key-exposure.
A. Desai +14 more
core +3 more sources
A biometrics-generated private/public key cryptography for a blockchain-based e-voting system
Voting aims to provide the best decision or select the most selected option for the largest group of voters. Malicious parties gaining access, and otherwise tampering with election results, or the votes make this effort counterproductive.
Jide Kehinde Adeniyi +6 more
doaj +2 more sources
Post-quantum cryptography-driven security framework for cloud computing
Data security in the cloud has been a major issue since the inception and adoption of cloud computing. Various frameworks have been proposed, and yet data breach prevails.
Ukwuoma Henry Chima +3 more
doaj +1 more source
Increasing the security of transmitted text messages using chaotic key and image key cryptography [PDF]
It is critical to safeguard confidential data, especially secret and private messages. This study introduces a novel data cryptography approach. The new approach will be capable of encrypting and decrypting any communication size.
Mua’ad Abu-Faraj +4 more
doaj +1 more source
Multilevel and compartmented access structures are two important classes of access structures where participants are grouped into levels/compartments with different degrees of trust and privileges.
Ferucio Laurenţiu Ţiplea +1 more
doaj +1 more source
Fault attacks on authenticated encryption modes for GIFT
There are several authenticated encryption modes for block cipher GIFT in the NIST lightweight cryptography standardisation process. In this study, the authors research on the fault attacks on this kind of authenticated encryption modes and mainly ...
Shuai Liu, Jie Guan, Bin Hu
doaj +1 more source
A new code‐based digital signature based on the McEliece cryptosystem
Digital signature schemes are used for the authentication and verification of signatures. The Courtois–Finiasz–Sendrier (CFS) digital signature is a well‐known code‐based digital signature scheme based on the Niederreiter cryptosystem. However, it is not
Farshid Haidary Makoui +2 more
doaj +1 more source
Efficient constructions for large‐state block ciphers based on AES New Instructions
Large‐state block ciphers with 256 bits or 512 bits block sizes receive much attention from the viewpoint of long‐term security. Existing large‐state block ciphers, such as Haraka‐v2 and Pholkos, consist of only the AES New Instructions set (AES‐NI) and ...
Rentaro Shiba +2 more
doaj +1 more source
Dynamic Cryptography Integrated Secured Decentralized Applications with Blockchain Programming
Blocks and chains are the building blocks of the blockchain, which is a community network. Blocks and chains are two terms used to describe collections of data information.
Jamal Kh-Madhloom
doaj +1 more source

