Results 11 to 20 of about 434,852 (214)
An image encryption scheme based on public key cryptosystem and quantum logistic map. [PDF]
Most of existing image encryption schemes are proposed in the spatial domain which easily destroys the correlation between pixels. This paper proposes an image encryption scheme by employing discrete cosine transform (DCT), quantum logistic map and ...
Ye G, Jiao K, Huang X, Goi BM, Yap WS.
europepmc +2 more sources
The KR-Elliptic Curve Public Key Cryptosystem
The connection between some fundamental mathematical problems in number theory with cryptography has been done in this work. A new version of the elliptic curve public key cryptosystem (ECPKC) has been proposed by Karrar Taher and Ruma Ajeena. Their main
K. T. R. Aljamaly, R. Ajeena
semanticscholar +1 more source
Undirected Complete Graph to Design New Public Key Cryptosystem
In this work, the alternative version of the ElGamal public key cryptosystem (EPKC) first is proposed. The revised EPKC depended on an extended discrete logarithm problem over matrices.
K. T. R. Aljamaly, R. Ajeena
semanticscholar +1 more source
Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley +1 more source
An Efficient Public Key Cryptosystem Based on Dihedral Group and Quantum Spin States
The enciphering schemes based on medium transformations by following the strict guidelines are almost used everywhere. We have developed the structure to simulate the digital data with quantum spin states rather than following or creating the strict ...
Hafiz Muhammad Waseem +2 more
semanticscholar +1 more source
A Public Key Cryptosystem Using a Group of Permutation Polynomials
In this paper we propose an efficient multivariate encryption scheme based on permutation polynomials over finite fields. We single out a commutative group ℒ(q, m) of permutation polynomials over the finite field Fqm. We construct a trapdoor function for
Rajesh P. Singh, B. K. Sarma, A. Saikia
semanticscholar +1 more source
Repairing the Faure-Loidreau Public-Key Cryptosystem [PDF]
A repair of the Faure-Loidreau (FL) public-key code-based cryptosystem is proposed. The FL cryptosystem is based on the hardness of list decoding Gabidulin codes which are special rank-metric codes.
A. Wachter-Zeh +2 more
semanticscholar +1 more source
A lightweight McEliece cryptosystem co-processor design [PDF]
Due to the rapid advances in the development of quantum computers and their susceptibility to errors, there is a renewed interest in error correction algorithms.
Agrawal, Rashmi +3 more
core +2 more sources
PKC-PC: A Variant of the McEliece Public Key Cryptosystem based on Polar Codes [PDF]
Polar codes are novel and efficient error correcting codes with low encoding and decoding complexities. These codes have a channel dependent generator matrix which is determined by the code dimension, code length and transmission channel parameters. This
Reza Hooshmand +2 more
semanticscholar +1 more source
A Group-Based NTRU-Like Public-Key Cryptosystem for IoT
The Internet of things have been widely used to improve our daily life. Public-key cryptosystem plays a central role in the security of IoT. However, classic public-key cryptosystems such as RSA and ECC are not suitable for IoT because of the complicated
Li Shuai +3 more
doaj +1 more source

