Results 1 to 10 of about 244,316 (299)

Novel Hybrid Public/Private Key Cryptography Based on Perfect Gaussian Integer Sequences [PDF]

open access: yesIEEE Access, 2021
This paper proposes a novel hybrid public/private key cryptography scheme based on perfect Gaussian integer sequences (PGISs) of period $N=pq$ . First, a review study of construction degree-4 PGIS is addressed.
Ching-Hsien Hsia   +3 more
doaj   +3 more sources

Forward-Security in Private-Key Cryptography [PDF]

open access: yesThe Cryptographer's Track at RSA Conference, 2002
This paper provides a comprehensive treatment of forward-security in the context of sharedkey based cryptographic primitives, as a practical means to mitigate the damage caused by key-exposure.
A. Desai   +14 more
core   +4 more sources

Increasing the security of transmitted text messages using chaotic key and image key cryptography [PDF]

open access: yesInternational Journal of Data and Network Science, 2023
It is critical to safeguard confidential data, especially secret and private messages. This study introduces a novel data cryptography approach. The new approach will be capable of encrypting and decrypting any communication size.
Mua’ad Abu-Faraj   +4 more
doaj   +2 more sources

PROTECTION OF KEY IN PRIVATE KEY CRYPTOGRAPHY. [PDF]

open access: yesInternational Journal of Advanced Research, 2017
Neha Tyagi, Ashish Agarwal, Anurag Katiyar, Shubham Garg and Shudhanshu Yadav G.L. Bajaj Institute of Technology & Management, Plot 2, Knowledge Park 3, Greater Noida, Distt. Gautam Budh Nagar, Uttar Pradesh, India.
Neha Tyagi   +4 more
openaire   +2 more sources

A Complex Matrix Private Key to Enhance the Security Level of Image Cryptography

open access: yesSymmetry, 2022
Standard methods used in the encryption and decryption process are implemented to protect confidential data. These methods require many arithmetic and logical operations that negatively affect the performance of the encryption process. In addition, they use private keys of a specific length, in addition to the fixed length of the data block used in ...
Mua’ad Abu-Faraj   +2 more
openaire   +2 more sources

On the Impossibility of Private Key Cryptography with Weakly Random Keys [PDF]

open access: yesAnnual International Cryptology Conference, 2007
The properties of weak sources of randomness have been investigated in many contexts and using several models of weakly random behaviour. For two such models, developed by Santha and Vazirani, and Chor and Goldreich, it is known that the output from one such source cannot be "compressed" to produce nearly random bits.
James L. McInnes, Benny Pinkas
openaire   +2 more sources

Circulant Rainbow: A New Rainbow Variant With Shorter Private Key and Faster Signature Generation

open access: yesIEEE Access, 2017
Rainbow is one of the most important signature schemes in multivariate public key cryptography. It enjoys a strong security guarantee and is a promising signature scheme in Post-Quantum Cryptography. However, it suffers from large key size. In this paper,
Zhiniang Peng, Shaohua Tang
doaj   +2 more sources

A Secure Visual Cryptography Scheme Using Private Key with Invariant Share Sizes

open access: yesJournal of Software Engineering and Applications, 2017
Visual cryptography (VC) is one of the best techniques used to secure information. It uses the human vision to decrypt the encrypted images without any cryptographic computations. The basic concept of visual cryptography is splitting the secret image into shares such that when the shares are stacked, the secret image is revealed.
Rola I. Al-Khalid   +4 more
openaire   +3 more sources

COMPARATIVE STUDY OF PRIVATE AND PUBLIC KEY CRYPTOGRAPHY ALGORITHMS: A SURVEY

open access: yesInternational Journal of Research in Engineering and Technology, 2014
Internet has revolutionized many aspects of our daily lives. Nowadays Internet is used for millions of applications. Many people depend on Internet for several activities like on-line banking, on-line shopping, on-line learning and on-line meetings etc. Huge amount of data travels over the network. Security of data over the network is a critical issue.
P. Bali
openaire   +2 more sources

Enhanced Key Protection in Private Key Cryptography

open access: yesInternational Journal for Research in Applied Science and Engineering Technology, 2017
A. Agarwal
openaire   +2 more sources

Home - About - Disclaimer - Privacy