Results 121 to 130 of about 319,858 (317)

Hidden Polynomial(s) Cryptosystems [PDF]

open access: yesarXiv, 2003
We propose public-key cryptosystems with public key a system of polynomial equations, algebraic or differential, and private key a single polynomial or a small-size ideal. We set up probabilistic encryption, signature, and signcryption protocols.
arxiv  

A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm

open access: yesArtificial Intelligence Review
In the era of digital communication and data security, image encryption plays a crucial role in safeguarding sensitive information. Protecting sensitive visual data from unauthorized access drives the pursuit of advanced image encryption methods.
Sanjay Kumar, Deepmala Sharma
semanticscholar   +1 more source

Hybrid Cryptography for Random-key Generation based on ECC Algorithm

open access: yes, 2017
As more increase in usage of communications and developing them more user friendly. While developing those communications, we need to take care of security and safety of user’s data.
P. Gayathri   +5 more
semanticscholar   +1 more source

Targeted Chemical Looping Materials Discovery by an Inverse Design

open access: yesAdvanced Intelligent Systems, EarlyView.
Taking the calculated Gibbs free energy of oxygen vacancy formation as inputs, an inverse high‐throughput machine learning workflow is developed to predict chemical formula of perovskite for chemical looping applications. Using this generic algorithm model, several new families of perovskites are identified as useful oxygen carrier materials ...
Brett A. Duell   +5 more
wiley   +1 more source

CASDC: A Cryptographically Secure Data System Based on Two Private Key Images

open access: gold, 2022
Mua’ad Abu-Faraj   +4 more
openalex   +1 more source

On Classical and Quantum Cryptography [PDF]

open access: yesarXiv, 2001
Lectures on classical and quantum cryptography. Contents: Private key cryptosystems. Elements of number theory. Public key cryptography and RSA cryptosystem. Shannon`s entropy and mutual information. Entropic uncertainty relations. The no cloning theorem. The BB84 quantum cryptographic protocol. Security proofs. Bell`s theorem.
arxiv  

THE McELIECE CRYPTOSYSTEM WITH ARRAY CODES

open access: yesSakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 2011
Public-key cryptosystems form an important part of cryptography. In these systems, every user has a public and a private key. The public key allows other users to encrypt messages, which can only be decoded using the secret private key.
Vedat Şiap
doaj   +1 more source

Implementation of Italian industry 4.0 quantum testbed in Turin

open access: yesIET Quantum Communication
The security of data communications is one of the crucial challenges that our society is facing today. Quantum Key Distribution (QKD) is one of the most prominent methods for guaranteeing ultimate security based on the laws of quantum physics.
Nicola Corrias   +17 more
doaj   +1 more source

Enhancing Image Cryptography Performance with Block Left Rotation Operations

open access: yesApplied Computational Intelligence and Soft Computing
In today’s interconnected world, the transmission of both lengthy and concise text messages is ubiquitous across diverse communication platforms. With the proliferation of sensitive and specialized information being exchanged, safeguarding these messages
M. Al-batah   +3 more
semanticscholar   +1 more source

E-VOTING PROTOCOL BASED ON PUBLIC -KEY CRYPTOGRAPHY

open access: yes, 2011
In this paper we propose a new secure E-Voting protocol based on public-key encryption cryptosystem. This protocol is summarized in three processes: firstly, access control process which involves the identification and authentication phases for the ...
Hayam K. Al-Anie   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy