Results 61 to 70 of about 219,404 (221)
Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages
Beginning with the proposal of the McEliece cryptosystem in 1978, code-based cryptography has positioned itself as one of main categories in post-quantum cryptography (PQC).
ByeongGyu Park+4 more
doaj +1 more source
Analysis of Elliptic Curve Cryptography & RSA
In today’s digital world, the Internet is an essential component of communication networks. It provides a platform for quickly exchanging information among communicating parties.
Mohammad Rafeek Khan+6 more
semanticscholar +1 more source
Data Reduction by Huffman Coding and Encryption by Insertion of Shuffled Cyclic Redundancy Code [PDF]
Cryptography today is assumed as the study of techniques and applications of securing the integrity and authenticity of transfer of information under difficult circumstances. It uses mathematical techniques related to aspects of information security such
Patra, Nilkesh, Sankar, Sila Siba
core
Review on DNA Cryptography [PDF]
Cryptography is the science that secures data and communication over the network by applying mathematics and logic to design strong encryption methods.
Mondal, Mandrita, Ray, Kumar S.
core +3 more sources
Securing Additive Manufacturing with Blockchains and Distributed Physically Unclonable Functions
Blockchain technology is a game-changing, enhancing security for the supply chain of smart additive manufacturing. Blockchain enables the tracking and recording of the history of each transaction in a ledger stored in the cloud that cannot be altered ...
Bertrand Cambou+9 more
doaj +1 more source
Advances in quantum cryptography [PDF]
Quantum cryptography is arguably the fastest growing area in quantum information science. Novel theoretical protocols are designed on a regular basis, security proofs are constantly improving, and experiments are gradually moving from proof-of-principle ...
S. Pirandola+17 more
semanticscholar +1 more source
Authentication of Quantum Messages
Authentication is a well-studied area of classical cryptography: a sender S and a receiver R sharing a classical private key want to exchange a classical message with the guarantee that the message has not been modified by any third party with control of
Barnum, Howard+4 more
core +2 more sources
Integrated semi‐quantum layered communication
In recent times, secure quantum communication in layered networks has emerged as an important area of study. The authors harness the potential offered by multidimensional states in secure quantum communication with only one quantum participant and all ...
Rajni Bala+2 more
doaj +1 more source
Fraction-Integer Mehod (FIM) for Calculating Multiplicative Inverse [PDF]
Multiplicative inverse is a crucial operation in public key cryptography. Public key cryptography has given rise to such a need, in which we need to generate a related public/private pair of numbers, each of which is the inverse of the other.
Sattar Aboud
doaj
Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps
This research paper presents a novel digital color image encryption approach that ensures high-level security while remaining simple and efficient. The proposed method utilizes a composite key r and x of 128-bits to create a small in-dimension private ...
Mua’ad Abu-Faraj+6 more
doaj +1 more source