Results 61 to 70 of about 219,404 (221)

Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages

open access: yesApplied Sciences, 2020
Beginning with the proposal of the McEliece cryptosystem in 1978, code-based cryptography has positioned itself as one of main categories in post-quantum cryptography (PQC).
ByeongGyu Park   +4 more
doaj   +1 more source

Analysis of Elliptic Curve Cryptography & RSA

open access: yesJournal of ICT Standardization, 2023
In today’s digital world, the Internet is an essential component of communication networks. It provides a platform for quickly exchanging information among communicating parties.
Mohammad Rafeek Khan   +6 more
semanticscholar   +1 more source

Data Reduction by Huffman Coding and Encryption by Insertion of Shuffled Cyclic Redundancy Code [PDF]

open access: yes, 2007
Cryptography today is assumed as the study of techniques and applications of securing the integrity and authenticity of transfer of information under difficult circumstances. It uses mathematical techniques related to aspects of information security such
Patra, Nilkesh, Sankar, Sila Siba
core  

Review on DNA Cryptography [PDF]

open access: yes, 2019
Cryptography is the science that secures data and communication over the network by applying mathematics and logic to design strong encryption methods.
Mondal, Mandrita, Ray, Kumar S.
core   +3 more sources

Securing Additive Manufacturing with Blockchains and Distributed Physically Unclonable Functions

open access: yesCryptography, 2020
Blockchain technology is a game-changing, enhancing security for the supply chain of smart additive manufacturing. Blockchain enables the tracking and recording of the history of each transaction in a ledger stored in the cloud that cannot be altered ...
Bertrand Cambou   +9 more
doaj   +1 more source

Advances in quantum cryptography [PDF]

open access: yesAdvances in Optics and Photonics, 2019
Quantum cryptography is arguably the fastest growing area in quantum information science. Novel theoretical protocols are designed on a regular basis, security proofs are constantly improving, and experiments are gradually moving from proof-of-principle ...
S. Pirandola   +17 more
semanticscholar   +1 more source

Authentication of Quantum Messages

open access: yes, 2002
Authentication is a well-studied area of classical cryptography: a sender S and a receiver R sharing a classical private key want to exchange a classical message with the guarantee that the message has not been modified by any third party with control of
Barnum, Howard   +4 more
core   +2 more sources

Integrated semi‐quantum layered communication

open access: yesIET Quantum Communication
In recent times, secure quantum communication in layered networks has emerged as an important area of study. The authors harness the potential offered by multidimensional states in secure quantum communication with only one quantum participant and all ...
Rajni Bala   +2 more
doaj   +1 more source

Fraction-Integer Mehod (FIM) for Calculating Multiplicative Inverse [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2004
Multiplicative inverse is a crucial operation in public key cryptography. Public key cryptography has given rise to such a need, in which we need to generate a related public/private pair of numbers, each of which is the inverse of the other.
Sattar Aboud
doaj  

Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps

open access: yesCryptography, 2023
This research paper presents a novel digital color image encryption approach that ensures high-level security while remaining simple and efficient. The proposed method utilizes a composite key r and x of 128-bits to create a small in-dimension private ...
Mua’ad Abu-Faraj   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy