Results 121 to 130 of about 319,858 (317)
Hidden Polynomial(s) Cryptosystems [PDF]
We propose public-key cryptosystems with public key a system of polynomial equations, algebraic or differential, and private key a single polynomial or a small-size ideal. We set up probabilistic encryption, signature, and signcryption protocols.
arxiv
A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm
In the era of digital communication and data security, image encryption plays a crucial role in safeguarding sensitive information. Protecting sensitive visual data from unauthorized access drives the pursuit of advanced image encryption methods.
Sanjay Kumar, Deepmala Sharma
semanticscholar +1 more source
Hybrid Cryptography for Random-key Generation based on ECC Algorithm
As more increase in usage of communications and developing them more user friendly. While developing those communications, we need to take care of security and safety of user’s data.
P. Gayathri+5 more
semanticscholar +1 more source
Targeted Chemical Looping Materials Discovery by an Inverse Design
Taking the calculated Gibbs free energy of oxygen vacancy formation as inputs, an inverse high‐throughput machine learning workflow is developed to predict chemical formula of perovskite for chemical looping applications. Using this generic algorithm model, several new families of perovskites are identified as useful oxygen carrier materials ...
Brett A. Duell+5 more
wiley +1 more source
CASDC: A Cryptographically Secure Data System Based on Two Private Key Images
Mua’ad Abu-Faraj+4 more
openalex +1 more source
On Classical and Quantum Cryptography [PDF]
Lectures on classical and quantum cryptography. Contents: Private key cryptosystems. Elements of number theory. Public key cryptography and RSA cryptosystem. Shannon`s entropy and mutual information. Entropic uncertainty relations. The no cloning theorem. The BB84 quantum cryptographic protocol. Security proofs. Bell`s theorem.
arxiv
THE McELIECE CRYPTOSYSTEM WITH ARRAY CODES
Public-key cryptosystems form an important part of cryptography. In these systems, every user has a public and a private key. The public key allows other users to encrypt messages, which can only be decoded using the secret private key.
Vedat Şiap
doaj +1 more source
Implementation of Italian industry 4.0 quantum testbed in Turin
The security of data communications is one of the crucial challenges that our society is facing today. Quantum Key Distribution (QKD) is one of the most prominent methods for guaranteeing ultimate security based on the laws of quantum physics.
Nicola Corrias+17 more
doaj +1 more source
Enhancing Image Cryptography Performance with Block Left Rotation Operations
In today’s interconnected world, the transmission of both lengthy and concise text messages is ubiquitous across diverse communication platforms. With the proliferation of sensitive and specialized information being exchanged, safeguarding these messages
M. Al-batah+3 more
semanticscholar +1 more source
E-VOTING PROTOCOL BASED ON PUBLIC -KEY CRYPTOGRAPHY
In this paper we propose a new secure E-Voting protocol based on public-key encryption cryptosystem. This protocol is summarized in three processes: firstly, access control process which involves the identification and authentication phases for the ...
Hayam K. Al-Anie+2 more
semanticscholar +1 more source