Results 31 to 40 of about 521,705 (324)
Lossless and Reversible Data Hiding in Encrypted Images With Public Key Cryptography
— The Lossless data hiding provides the embedding of data in a host image without any loss of data. This research explain a lossless data hiding and image cryptography method based on Choas - Block to image encryption the lossless means if the marked ...
Monika Bartwal, R. Bharti
semanticscholar +1 more source
Tensor-based trapdoors for CVP and their application to public key cryptography [PDF]
We propose two trapdoors for the Closest-Vector-Problem in lattices (CVP) related to the lattice tensor product.
Fischlin, Roger, Seifert, Jean-Pierre
core +2 more sources
Analysis of Elliptic Curve Cryptography (ECC) for Energy Efficiency in Wireless Sensor Networks
Rapid growth of wireless sensor networks (WSN) in recent times has resulted in greater security requirements. One of the primary concerns in wireless sensor networks is energy efficiency and security mechanisms are no different.
Zain Ul Abideen Tariq +2 more
doaj +1 more source
Dynamic Cryptography Integrated Secured Decentralized Applications with Blockchain Programming
Blocks and chains are the building blocks of the blockchain, which is a community network. Blocks and chains are two terms used to describe collections of data information.
Jamal Kh-Madhloom
doaj +1 more source
IMPROVING SMART GRID SECURITY USING MERKLE TREES [PDF]
—Presently nations worldwide are starting to convert their aging electrical power infrastructures into modern, dynamic power grids. Smart Grid offers much in the way of efficiencies and robustness to the electrical power grid, however its heavy reliance ...
Muñoz, Melesio Calderón
core +2 more sources
A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things
The Internet of Things envisages connecting all physical objects or things to the Internet, using devices as diverse as smartphones, coffee makers, washing machines, automobiles, lamps, and wearable devices, among many others.
Manisha Malik, M. Dutta, J. Granjal
semanticscholar +1 more source
Quantum‐resistant anonymous identity‐based encryption with trable identities
Identity‐based encryption (IBE), introduced by Shamir, eliminates the need for public‐key infrastructure. The sender can simply encrypt a message by using the recipient's identity (such as email or IP address) without needing to look up the public key ...
Zi‐Yuan Liu +4 more
doaj +1 more source
Asynchronous Consensus without Trusted Setup or Public-Key Cryptography
Byzantine consensus is a fundamental building block in distributed cryptographic problems. Despite decades of research, most existing asynchronous consensus protocols require a strong trusted setup and expensive public-key cryptography. In this paper, we
Sourav Das +5 more
semanticscholar +1 more source
A revolutionary change to public-key cryptography can be considered as an Identity Based Cryptography (IBC) in which identity of the receiver is being used as a public key for encrypting a message and Key Generation Centre (KGC).
Maitri Patel, Rajan Patel
doaj +1 more source
A STUDY OF BILINEAR MAPS IN WIRELESS SENSOR NETWORKS
In the past, a large part of security requirements of wireless sensor networks (WSN) were fulfilled by symmetric cryptography systems. But, today by introduction of new needs in these networks and their security development, researchers of security and ...
Reza Alimoradi +2 more
doaj +1 more source

