Results 251 to 260 of about 505,863 (290)
Some of the next articles are maybe not open access.

A Novel Probabilistic Shaping Based Chaotic Encryption for VLC Systems

2023 Asia Communications and Photonics Conference/2023 International Photonics and Optoelectronics Meetings (ACP/POEM), 2023
Visible light communication (VLC) suffers from eavesdropping due to its broadcast nature and channel openness in public areas. In this paper, we propose a low-rate loss distribution matching to generate shaped symbols, further employing chaotic sequences
Jiaqi Chen   +4 more
semanticscholar   +1 more source

An efficient probabilistic encryption scheme

Information Processing Letters, 1990
In this paper we present a new probabilistic encryption algorithm in which system security is polynomially secure. We first review and develop some properties associated with the quadratic residue modulo n, where n is a product of two primes, each congruent to 3 modulo 4.
Harn, Lein, Kiesler, Thomas
openaire   +2 more sources

Probabilistic Encryption--A Practical Implementation

2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, 2009
This paper aims to provide a practical implementation of a probabilistic cipher by extending on the algorithms by Fuchsbauer, Goldwasser and Micali. We provide details on designing and implementing the cipher and further support our understanding by providing a statistical analysis of our implementation for the key generation, encryption, and ...
Orhio Mark Creado   +3 more
openaire   +1 more source

A knapsack-based probabilistic encryption scheme

Information Sciences, 2007
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Wang, Baocang, Wu, Qianhong, Hu, Yupu
openaire   +2 more sources

Implementation of Public Key Crypto Processor with Probabilistic Encryption on FPGA for Nodes in Wireless Sensor Networks

International Conference on Computing Communication and Networking Technologies, 2018
Cryptographic algorithms are fundamental to the secure communications over Wireless Sensor Networks. This paper presents complete public key cryptosystem with mathematical model essential for designing a cryptographic algorithm that integrates ...
G. Leelavathi   +2 more
semanticscholar   +1 more source

Probabilistic Shaping Encryption Scheme Based on Dual-Parameter Bit-Weighted Distribution Matching in MMW-RoF System

Journal of Lightwave Technology
In order to face the challenges of reliable performance and physical layer security performance in millimeter-wave radio-over-fiber (MMW-RoF), a probabilistic shaping (PS) encryption scheme based on dual-parameter bit-weighted distribution matching is ...
Yaoqiang Xiao   +5 more
semanticscholar   +1 more source

A lossless probabilistic image encryption algorithm based on QSD decomposition and matrix transformations

International Journal of Computer Applications
With the development of Internet technology, images have become widely used in people's daily life. However, some images carry significant importance and sensitivity, making the security and protection of digital information more crucial.
Oussama Harkati, L. Noui, Assia Beloucif
semanticscholar   +1 more source

Synchronization-Assisted Chaotic Permutation Information Encryption Security Enhancement Based on OFDM-FSO Probabilistic Shaping

Journal of Lightwave Technology
In this article, we propose a method to encrypt the permutation information (PI) and insert the synchronization head based on digital chaos and constellation shaping for orthogonal frequency division multiplexing-free space optical (OFDM-FSO ...
Tingwei Wu   +8 more
semanticscholar   +1 more source

Method for Pseudo-probabilistic Block Encryption

2018
There is considered implementation of the plan-ahead share-key deniable encryption algorithms that produce the cryptogram that satisfy criterion of the computational indistinguishability from probabilistic encryption of the fake message. This paper introduces a general design of the pseudoprobabilistic block ciphers.
Moldovyan Nikolay Andreevich   +4 more
openaire   +1 more source

Secured cloud data migration technique by competent probabilistic public key encryption

China Communications, 2020
Cloud computing, a recently emerged paradigm faces major challenges in achieving the privacy of migrated data, network security, etc. Too many cryptographic technologies are raised to solve these issues based on identity, attributes and prediction ...
Bo Cheng, M. Aruna, K. Mohan
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy