Results 71 to 80 of about 219,404 (221)
Separable Reversible Data Hiding in Encrypted Signals with Public Key Cryptography
We propose separable reversible data hiding in an encrypted signal with public key cryptography. In our separable framework, the image owner encrypts the original image by using a public key. On receipt of the encrypted signal, the data-hider embeds data
W. Tai, Ya-Fen Chang
semanticscholar +1 more source
Image Security using Visual Cryptography [PDF]
Informations are being transferred through open channels and the security of those informations has been prime concerns. Apart from many conventional cryptographic schemes, visual cryptographic techniques have also been in use for data and information ...
Bhuyan, Sangeeta
core
From Quantum Cheating to Quantum Security [PDF]
For thousands of years, code-makers and code-breakers have been competing for supremacy. Their arsenals may soon include a powerful new weapon: quantum mechanics. We give an overview of quantum cryptology as of November 2000.Comment: 14 pages, 4 figures.
Gottesman, Daniel, Lo, Hoi-Kwong
core +4 more sources
Certificateless Blind Signature Based on DLP [PDF]
The most widely used digital signature in the real word application such as e cash e-voting etc. is blind signature. Previously the proposed blind signature follow the foot steps of public key cryptography(PKC) but conventional public key cryptography ...
Kumar, Samir
core
The Internet of Things (IoT) as an important technology consists of a heterogeneous and huge number of devices that generates an enormous amount of data in various applications.
Arkan A. Saffer +2 more
doaj +1 more source
Key derivation function: key-hash based computational extractor and stream based pseudorandom expander [PDF]
The key derivation function is a specific cryptographic algorithm that transforms private string and public strings into one or more cryptographic keys.
Chai Wen Chuah+2 more
doaj +2 more sources
Assessment of Work Pedestal on RSA in Text Cryptographic System [PDF]
Cryptography is a Greek word, crypto signifies ‘hidden or covered up’ and graphy means ‘study’. The conversion of plain text to cipher text is called as encryption and changing the cipher text to plain text is called as decryption.
Panwar , Aashish+2 more
core +1 more source
Analisis Kompleksitas Waktu Algoritma Kriptografi Elgamal dan Data Encryption Standard [PDF]
ElGamal as an asymmetric key cryptography system and Data Encryption Standard (DES) as a symmetric key cryptography system, both of algorithms will be compared using the time complexity analysis and computer simulation.
Kabetta, H. (Herman)
core
Research on key management and authentication protocol of PDA in smart grid
According to PDA in smart grid, which faced with security issues, key management and authentication protocol for PDA in smart grid based on scrambling PUF were presented.
YU Xiao, TIAN Li, WANG Jie, LIU Zhe
doaj +3 more sources
Authentication Schemes Using Polynomials Over Non-Commutative Rings
Authentication is a process by which an entity,which could be a person or intended computer,establishes its identity to another entity.In private and public computer networks including the Internet,authentication is commonly done through the use of logon
Valluri, Maheswara Rao
core +1 more source