Results 251 to 260 of about 505,863 (290)
Some of the next articles are maybe not open access.
A Novel Probabilistic Shaping Based Chaotic Encryption for VLC Systems
2023 Asia Communications and Photonics Conference/2023 International Photonics and Optoelectronics Meetings (ACP/POEM), 2023Visible light communication (VLC) suffers from eavesdropping due to its broadcast nature and channel openness in public areas. In this paper, we propose a low-rate loss distribution matching to generate shaped symbols, further employing chaotic sequences
Jiaqi Chen +4 more
semanticscholar +1 more source
An efficient probabilistic encryption scheme
Information Processing Letters, 1990In this paper we present a new probabilistic encryption algorithm in which system security is polynomially secure. We first review and develop some properties associated with the quadratic residue modulo n, where n is a product of two primes, each congruent to 3 modulo 4.
Harn, Lein, Kiesler, Thomas
openaire +2 more sources
Probabilistic Encryption--A Practical Implementation
2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, 2009This paper aims to provide a practical implementation of a probabilistic cipher by extending on the algorithms by Fuchsbauer, Goldwasser and Micali. We provide details on designing and implementing the cipher and further support our understanding by providing a statistical analysis of our implementation for the key generation, encryption, and ...
Orhio Mark Creado +3 more
openaire +1 more source
A knapsack-based probabilistic encryption scheme
Information Sciences, 2007zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Wang, Baocang, Wu, Qianhong, Hu, Yupu
openaire +2 more sources
International Conference on Computing Communication and Networking Technologies, 2018
Cryptographic algorithms are fundamental to the secure communications over Wireless Sensor Networks. This paper presents complete public key cryptosystem with mathematical model essential for designing a cryptographic algorithm that integrates ...
G. Leelavathi +2 more
semanticscholar +1 more source
Cryptographic algorithms are fundamental to the secure communications over Wireless Sensor Networks. This paper presents complete public key cryptosystem with mathematical model essential for designing a cryptographic algorithm that integrates ...
G. Leelavathi +2 more
semanticscholar +1 more source
Journal of Lightwave Technology
In order to face the challenges of reliable performance and physical layer security performance in millimeter-wave radio-over-fiber (MMW-RoF), a probabilistic shaping (PS) encryption scheme based on dual-parameter bit-weighted distribution matching is ...
Yaoqiang Xiao +5 more
semanticscholar +1 more source
In order to face the challenges of reliable performance and physical layer security performance in millimeter-wave radio-over-fiber (MMW-RoF), a probabilistic shaping (PS) encryption scheme based on dual-parameter bit-weighted distribution matching is ...
Yaoqiang Xiao +5 more
semanticscholar +1 more source
International Journal of Computer Applications
With the development of Internet technology, images have become widely used in people's daily life. However, some images carry significant importance and sensitivity, making the security and protection of digital information more crucial.
Oussama Harkati, L. Noui, Assia Beloucif
semanticscholar +1 more source
With the development of Internet technology, images have become widely used in people's daily life. However, some images carry significant importance and sensitivity, making the security and protection of digital information more crucial.
Oussama Harkati, L. Noui, Assia Beloucif
semanticscholar +1 more source
Journal of Lightwave Technology
In this article, we propose a method to encrypt the permutation information (PI) and insert the synchronization head based on digital chaos and constellation shaping for orthogonal frequency division multiplexing-free space optical (OFDM-FSO ...
Tingwei Wu +8 more
semanticscholar +1 more source
In this article, we propose a method to encrypt the permutation information (PI) and insert the synchronization head based on digital chaos and constellation shaping for orthogonal frequency division multiplexing-free space optical (OFDM-FSO ...
Tingwei Wu +8 more
semanticscholar +1 more source
Method for Pseudo-probabilistic Block Encryption
2018There is considered implementation of the plan-ahead share-key deniable encryption algorithms that produce the cryptogram that satisfy criterion of the computational indistinguishability from probabilistic encryption of the fake message. This paper introduces a general design of the pseudoprobabilistic block ciphers.
Moldovyan Nikolay Andreevich +4 more
openaire +1 more source
Secured cloud data migration technique by competent probabilistic public key encryption
China Communications, 2020Cloud computing, a recently emerged paradigm faces major challenges in achieving the privacy of migrated data, network security, etc. Too many cryptographic technologies are raised to solve these issues based on identity, attributes and prediction ...
Bo Cheng, M. Aruna, K. Mohan
semanticscholar +1 more source

