Results 1 to 10 of about 228,674 (308)
Novel Hybrid Public/Private Key Cryptography Based on Perfect Gaussian Integer Sequences [PDF]
This paper proposes a novel hybrid public/private key cryptography scheme based on perfect Gaussian integer sequences (PGISs) of period N = pq. First, a review study of construction degree-4 PGIS is addressed.We show that circular convolution over PGISs ...
Ching-Hsien Hsia +3 more
semanticscholar +4 more sources
Forward-Security in Private-Key Cryptography [PDF]
This paper provides a comprehensive treatment of forward-security in the context of sharedkey based cryptographic primitives, as a practical means to mitigate the damage caused by key-exposure.
A. Desai +14 more
core +4 more sources
A Complex Matrix Private Key to Enhance the Security Level of Image Cryptography [PDF]
Standard methods used in the encryption and decryption process are implemented to protect confidential data. These methods require many arithmetic and logical operations that negatively affect the performance of the encryption process.
Mua’ad Abu-Faraj +2 more
openalex +2 more sources
PROTECTION OF KEY IN PRIVATE KEY CRYPTOGRAPHY. [PDF]
Neha Tyagi, Ashish Agarwal, Anurag Katiyar, Shubham Garg and Shudhanshu Yadav G.L. Bajaj Institute of Technology & Management, Plot 2, Knowledge Park 3, Greater Noida, Distt. Gautam Budh Nagar, Uttar Pradesh, India.
Neha Tyagi +4 more
openalex +2 more sources
Increasing the security of transmitted text messages using chaotic key and image key cryptography [PDF]
It is critical to safeguard confidential data, especially secret and private messages. This study introduces a novel data cryptography approach. The new approach will be capable of encrypting and decrypting any communication size.
M. Abu-faraj +4 more
semanticscholar +2 more sources
A Secure Visual Cryptography Scheme Using Private Key with Invariant Share Sizes
Visual cryptography (VC) is one of the best techniques used to secure information. It uses the human vision to decrypt the encrypted images without any cryptographic computations.
Rola Al-Khalid +4 more
openalex +3 more sources
Methods for Protection of Key in Private Key Cryptography [PDF]
NehaTyagi +4 more
semanticscholar +3 more sources
COMPARATIVE STUDY OF PRIVATE AND PUBLIC KEY CRYPTOGRAPHY ALGORITHMS: A SURVEY
Priti Bali .
openalex +2 more sources

