Results 11 to 20 of about 3,565 (253)
First end‐to‐end PQC protected DPU‐to‐DPU communications
The appearance of quantum computing in the short foreseeable future and its capability to break conventional cryptographic algorithms forces to change the paradigm of secure real‐time communications.
A. Cano Aguilera +4 more
doaj +1 more source
Cryptography system gives security services ability to protect information from people who are authorized to use it. This research introduces elevated information security system via hybrid of new expand Rivest Shamir Adleman (RSA) and data encryption ...
M. B. Hammawa +2 more
doaj +1 more source
Quantum asymmetric key crypto scheme using Grover iteration
Here, we propose a quantum asymmetric key cryptography scheme using Grover’s quantum search algorithm. In the proposed scheme, Alice generates a pair of public and private keys, keeps the private keys safe, and only discloses public keys to the outside ...
Chun Seok Yoon +4 more
doaj +1 more source
Circulant Rainbow: A New Rainbow Variant With Shorter Private Key and Faster Signature Generation
Rainbow is one of the most important signature schemes in multivariate public key cryptography. It enjoys a strong security guarantee and is a promising signature scheme in Post-Quantum Cryptography. However, it suffers from large key size. In this paper,
Zhiniang Peng, Shaohua Tang
doaj +1 more source
A Complex Matrix Private Key to Enhance the Security Level of Image Cryptography
Standard methods used in the encryption and decryption process are implemented to protect confidential data. These methods require many arithmetic and logical operations that negatively affect the performance of the encryption process. In addition, they use private keys of a specific length, in addition to the fixed length of the data block used in ...
Mua’ad Abu-Faraj +2 more
openaire +1 more source
Arabic Text Encryption Using Artificial Neural Networks [PDF]
This research aims to build a cipher system using back propagation Algorithm with artificial neural network to encrypt any Arabic text and to prevent any data attack during the transition process.Encryption information holdsfour stages: 1)A neural ...
Oday Kamil Hamid
doaj +1 more source
Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks
Certificate-based cryptography is an attractive public-key setting, and it not only simplifies certificate management in the traditional public-key cryptography but also eliminates the key escrow problem inherent in the identity-based cryptography ...
Jui-Di Wu +3 more
doaj +1 more source
A Secure Private Key Recovery Based on DNA Bio-Cryptography for Blockchain
The existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet.
Asia Ali Salman Al-karkhi +2 more
openaire +1 more source
Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions
Lattice and code cryptography can replace existing schemes such as elliptic curve cryptography because of their resistance to quantum computers. In support of public key infrastructures, the distribution, validation and storage of the cryptographic keys ...
Bertrand Cambou +8 more
doaj +1 more source
On the Impossibility of Private Key Cryptography with Weakly Random Keys [PDF]
The properties of weak sources of randomness have been investigated in many contexts and using several models of weakly random behaviour. For two such models, developed by Santha and Vazirani, and Chor and Goldreich, it is known that the output from one such source cannot be "compressed" to produce nearly random bits.
James L. McInnes, Benny Pinkas
openaire +1 more source

