Results 251 to 260 of about 493,090 (289)
Some of the next articles are maybe not open access.

Implementation of Public Key Crypto Processor with Probabilistic Encryption on FPGA for Nodes in Wireless Sensor Networks

International Conference on Computing Communication and Networking Technologies, 2018
Cryptographic algorithms are fundamental to the secure communications over Wireless Sensor Networks. This paper presents complete public key cryptosystem with mathematical model essential for designing a cryptographic algorithm that integrates ...
G. Leelavathi   +2 more
semanticscholar   +1 more source

A lossless probabilistic image encryption algorithm based on QSD decomposition and matrix transformations

International Journal of Computer Applications
With the development of Internet technology, images have become widely used in people's daily life. However, some images carry significant importance and sensitivity, making the security and protection of digital information more crucial.
Oussama Harkati, L. Noui, Assia Beloucif
semanticscholar   +1 more source

Synchronization-Assisted Chaotic Permutation Information Encryption Security Enhancement Based on OFDM-FSO Probabilistic Shaping

Journal of Lightwave Technology
In this article, we propose a method to encrypt the permutation information (PI) and insert the synchronization head based on digital chaos and constellation shaping for orthogonal frequency division multiplexing-free space optical (OFDM-FSO ...
Tingwei Wu   +8 more
semanticscholar   +1 more source

A Probabilistic Encryption Based MIN/MAX Computation in Wireless Sensor Networks

open access: closed2013 IEEE 14th International Conference on Mobile Data Management, 2013
Bharath K. Samanthula   +2 more
openalex   +2 more sources

Method for Pseudo-probabilistic Block Encryption

2018
There is considered implementation of the plan-ahead share-key deniable encryption algorithms that produce the cryptogram that satisfy criterion of the computational indistinguishability from probabilistic encryption of the fake message. This paper introduces a general design of the pseudoprobabilistic block ciphers.
Minh Nguyen Hieu   +4 more
openaire   +2 more sources

Secured cloud data migration technique by competent probabilistic public key encryption

China Communications, 2020
Cloud computing, a recently emerged paradigm faces major challenges in achieving the privacy of migrated data, network security, etc. Too many cryptographic technologies are raised to solve these issues based on identity, attributes and prediction ...
Bo Cheng, M. Aruna, K. Mohan
semanticscholar   +1 more source

Investigation of probabilistic encryption method based on 3-LFSR

2010 International Conference on Computer Application and System Modeling (ICCASM 2010), 2010
This paper investigates a new method of probabilistic encryption scheme based on the third-order linear feedback shift register sequence (3-LFSR). The message can be hidden in the exponent. From the definition of LFSR residue problem in Zn, the proposed encryption scheme has property of semantic security, and messages can be concealed better than ...
Wen Liu   +4 more
openaire   +2 more sources

Probabilistic completeness of substitution-permutation encryption networks

IEE Proceedings E Computers and Digital Techniques, 1982
A variant of the substitution-permutation encryption network, which incorporates random permutations, is presented and shown to retain, with a very high probability, the cryptographically important property of completeness after a small number of rounds.
openaire   +2 more sources

Probabilistic Encryption--A Comparative Analysis against RSA and ECC

2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, 2009
This paper aims to provide a comparative analysis of the probabilistic versus the deterministic security models. We provide a benchmark by practically implementing and comparing three ciphers - Probabilistic Cipher (PC), RSA, and ECC. This paper provides the algorithms to implement these ciphers as well as highlights the operating time and performance ...
Phu Dung Le   +3 more
openaire   +2 more sources

A multipermutation superposition coding-based fragile watermarking for probabilistic encryption

Multimedia tools and applications, 2022
Li Jiang   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy