Results 1 to 10 of about 218,553 (322)

Novel Hybrid Public/Private Key Cryptography Based on Perfect Gaussian Integer Sequences [PDF]

open access: goldIEEE Access, 2021
This paper proposes a novel hybrid public/private key cryptography scheme based on perfect Gaussian integer sequences (PGISs) of period $N=pq$ . First, a review study of construction degree-4 PGIS is addressed.
Ching-Hsien Hsia   +3 more
doaj   +4 more sources

A biometrics-generated private/public key cryptography for a blockchain-based e-voting system

open access: goldEgyptian Informatics Journal
Voting aims to provide the best decision or select the most selected option for the largest group of voters. Malicious parties gaining access, and otherwise tampering with election results, or the votes make this effort counterproductive.
Jide Kehinde Adeniyi   +6 more
doaj   +3 more sources

A Complex Matrix Private Key to Enhance the Security Level of Image Cryptography [PDF]

open access: goldSymmetry, 2022
Standard methods used in the encryption and decryption process are implemented to protect confidential data. These methods require many arithmetic and logical operations that negatively affect the performance of the encryption process. In addition, they use private keys of a specific length, in addition to the fixed length of the data block used in ...
Mua’ad Abu-Faraj   +2 more
openalex   +2 more sources

COMPARATIVE STUDY OF PRIVATE AND PUBLIC KEY CRYPTOGRAPHY ALGORITHMS: A SURVEY [PDF]

open access: bronzeInternational Journal of Research in Engineering and Technology, 2014
Internet has revolutionized many aspects of our daily lives. Nowadays Internet is used for millions of applications. Many people depend on Internet for several activities like on-line banking, on-line shopping, on-line learning and on-line meetings etc. Huge amount of data travels over the network. Security of data over the network is a critical issue.
Priti Bali .
openalex   +2 more sources

Discovery of Elliptic Curve Cryptographic Private Key in O(n) [PDF]

open access: greenarXiv, 2009
An algorithm is presented that in context of public key use of Elliptic Curve Cryptography allows discovery of the private key in worst case O(n).
Charles Sauerbier
arxiv   +3 more sources

A Secure Private Key Recovery Based on DNA Bio-Cryptography for Blockchain

open access: goldIraqi Journal of Science, 2023
     The existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet.
Asia Ali Salman Al-karkhi   +2 more
openalex   +3 more sources

Function Codes for Protection of Key in Private Key Cryptography [PDF]

open access: green, 2017
In order to check the applicability and correctness of any designed algorithm, it is must to write a code on any suitable platform that successfully implements the logic. The present work is actually an extension to what we have done in our previous works where we have tried to devise an algorithm which is based on the most popular and largely applied ...
Ashish Agarwal   +4 more
openalex   +2 more sources

A Decentralized Signcryption Scheme Based on CFL [PDF]

open access: yesSensors
The rapid advancement of quantum computing technology poses a significant threat to conventional public key cryptographic infrastructure. The SM2 (state key cryptography algorithm no.
Leyi Shi, Mengting Liu
doaj   +2 more sources

A Secure Visual Cryptography Scheme Using Private Key with Invariant Share Sizes

open access: hybridJournal of Software Engineering and Applications, 2017
Visual cryptography (VC) is one of the best techniques used to secure information. It uses the human vision to decrypt the encrypted images without any cryptographic computations. The basic concept of visual cryptography is splitting the secret image into shares such that when the shares are stacked, the secret image is revealed.
Rola Al-Khalid   +4 more
openalex   +4 more sources

Privately Generated Key Pairs for Post Quantum Cryptography in a Distributed Network

open access: goldApplied Sciences
In the proposed protocol, a trusted entity interacts with the terminal device of each user to verify the legitimacy of the public keys without having access to the private keys that are generated and kept totally secret by the user. The protocol introduces challenge–response–pair mechanisms enabling the generation, distribution, and verification of ...
Mahafujul Alam   +2 more
openalex   +3 more sources

Home - About - Disclaimer - Privacy