Results 1 to 10 of about 171,298 (287)

Novel Hybrid Public/Private Key Cryptography Based on Perfect Gaussian Integer Sequences [PDF]

open access: goldIEEE Access, 2021
This paper proposes a novel hybrid public/private key cryptography scheme based on perfect Gaussian integer sequences (PGISs) of period $N=pq$ . First, a review study of construction degree-4 PGIS is addressed.
Ching-Hsien Hsia   +3 more
doaj   +3 more sources

Increasing the security of transmitted text messages using chaotic key and image key cryptography [PDF]

open access: yesInternational Journal of Data and Network Science, 2023
It is critical to safeguard confidential data, especially secret and private messages. This study introduces a novel data cryptography approach. The new approach will be capable of encrypting and decrypting any communication size.
Mua’ad Abu-Faraj   +4 more
doaj   +2 more sources

A Complex Matrix Private Key to Enhance the Security Level of Image Cryptography [PDF]

open access: goldSymmetry, 2022
Standard methods used in the encryption and decryption process are implemented to protect confidential data. These methods require many arithmetic and logical operations that negatively affect the performance of the encryption process.
M. Abu-faraj   +2 more
semanticscholar   +2 more sources

Circulant Rainbow: A New Rainbow Variant With Shorter Private Key and Faster Signature Generation

open access: yesIEEE Access, 2017
Rainbow is one of the most important signature schemes in multivariate public key cryptography. It enjoys a strong security guarantee and is a promising signature scheme in Post-Quantum Cryptography. However, it suffers from large key size. In this paper,
Zhiniang Peng, Shaohua Tang
doaj   +2 more sources

A Decentralized Signcryption Scheme Based on CFL [PDF]

open access: yesSensors
The rapid advancement of quantum computing technology poses a significant threat to conventional public key cryptographic infrastructure. The SM2 (state key cryptography algorithm no.
Leyi Shi, Mengting Liu
doaj   +2 more sources

Enhancing IoT security with a DNA-based lightweight cryptography system [PDF]

open access: yesScientific Reports
The rapid increase of internet of things (IoT) devices in our daily lives has highlighted the critical need for strong security measures to protect the integrity and confidentiality of IoT communications.
Sehrish Aqeel   +4 more
doaj   +2 more sources

Post-quantum cryptography-driven security framework for cloud computing

open access: yesOpen Computer Science, 2022
Data security in the cloud has been a major issue since the inception and adoption of cloud computing. Various frameworks have been proposed, and yet data breach prevails.
Ukwuoma Henry Chima   +3 more
doaj   +1 more source

Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures

open access: yesIET Information Security, 2021
Multilevel and compartmented access structures are two important classes of access structures where participants are grouped into levels/compartments with different degrees of trust and privileges.
Ferucio Laurenţiu Ţiplea   +1 more
doaj   +1 more source

Fault attacks on authenticated encryption modes for GIFT

open access: yesIET Information Security, 2022
There are several authenticated encryption modes for block cipher GIFT in the NIST lightweight cryptography standardisation process. In this study, the authors research on the fault attacks on this kind of authenticated encryption modes and mainly ...
Shuai Liu, Jie Guan, Bin Hu
doaj   +1 more source

A new code‐based digital signature based on the McEliece cryptosystem

open access: yesIET Communications, 2023
Digital signature schemes are used for the authentication and verification of signatures. The Courtois–Finiasz–Sendrier (CFS) digital signature is a well‐known code‐based digital signature scheme based on the Niederreiter cryptosystem. However, it is not
Farshid Haidary Makoui   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy