Increasing the security of transmitted text messages using chaotic key and image key cryptography [PDF]
It is critical to safeguard confidential data, especially secret and private messages. This study introduces a novel data cryptography approach. The new approach will be capable of encrypting and decrypting any communication size.
Mua’ad Abu-Faraj+4 more
doaj +2 more sources
Discovery of Elliptic Curve Cryptographic Private Key in O(n) [PDF]
An algorithm is presented that in context of public key use of Elliptic Curve Cryptography allows discovery of the private key in worst case O(n).
Charles Sauerbier
arxiv +3 more sources
A Secure Private Key Recovery Based on DNA Bio-Cryptography for Blockchain
The existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet.
Asia Ali Salman Al-karkhi+2 more
openaire +3 more sources
Function Codes For Protection Of Key In Private Key Cryptography [PDF]
In order to check the applicability and correctness of any designed algorithm, it is must to write a code on any suitable platform that successfully implements the logic. The present work is actually an extension to what we have done in our previous works where we have tried to devise an algorithm which is based on the most popular and largely applied ...
Ashish Agarwal+4 more
openaire +2 more sources
Enhanced Key Protection in Private Key Cryptography
: The adventurous ventures of technology have proved to be the reason(s) to consistently work in the orientation that lands you in the new domain acquiring its foundation in the existing frameworks.
A. Agarwal
openaire +3 more sources
Circulant Rainbow: A New Rainbow Variant With Shorter Private Key and Faster Signature Generation
Rainbow is one of the most important signature schemes in multivariate public key cryptography. It enjoys a strong security guarantee and is a promising signature scheme in Post-Quantum Cryptography. However, it suffers from large key size. In this paper,
Zhiniang Peng, Shaohua Tang
doaj +2 more sources
Privately Generated Key Pairs for Post Quantum Cryptography in a Distributed Network
In the proposed protocol, a trusted entity interacts with the terminal device of each user to verify the legitimacy of the public keys without having access to the private keys that are generated and kept totally secret by the user. The protocol introduces challenge–response–pair mechanisms enabling the generation, distribution, and verification of ...
Mahafujul Alam+2 more
openaire +3 more sources
Dual-band complex-amplitude metasurface empowered high security cryptography with ultra-massive encodable patterns. [PDF]
The significance of a cryptograph method lies in its ability to provide high fidelity, high security, and large capacity. The emergence of metasurface-empowered cryptography offers a promising alternative due to its unparalleled wavefront modulation ...
Gu Z+9 more
europepmc +2 more sources
Secure, Image based Private Key for Secret Message Cryptography
Amjad Al Hindi+2 more
openaire +2 more sources
An efficient certificateless anonymous signcryption communication scheme for vehicular adhoc network. [PDF]
Certificateless public key infrastructure (PKI) avoids the key escrow problem associated with identity-based PKI and has recently been widely employed in anonymous communication schemes for vehicular adhoc networks (VANETs).
Luo C, Li D, Khan MS.
europepmc +2 more sources