Results 11 to 20 of about 434,852 (214)

An image encryption scheme based on public key cryptosystem and quantum logistic map. [PDF]

open access: yesSci Rep, 2020
Most of existing image encryption schemes are proposed in the spatial domain which easily destroys the correlation between pixels. This paper proposes an image encryption scheme by employing discrete cosine transform (DCT), quantum logistic map and ...
Ye G, Jiao K, Huang X, Goi BM, Yap WS.
europepmc   +2 more sources

The KR-Elliptic Curve Public Key Cryptosystem

open access: yesJournal of Physics: Conference Series, 2021
The connection between some fundamental mathematical problems in number theory with cryptography has been done in this work. A new version of the elliptic curve public key cryptosystem (ECPKC) has been proposed by Karrar Taher and Ruma Ajeena. Their main
K. T. R. Aljamaly, R. Ajeena
semanticscholar   +1 more source

Undirected Complete Graph to Design New Public Key Cryptosystem

open access: yesJournal of Physics: Conference Series, 2021
In this work, the alternative version of the ElGamal public key cryptosystem (EPKC) first is proposed. The revised EPKC depended on an extended discrete logarithm problem over matrices.
K. T. R. Aljamaly, R. Ajeena
semanticscholar   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

An Efficient Public Key Cryptosystem Based on Dihedral Group and Quantum Spin States

open access: yesIEEE Access, 2020
The enciphering schemes based on medium transformations by following the strict guidelines are almost used everywhere. We have developed the structure to simulate the digital data with quantum spin states rather than following or creating the strict ...
Hafiz Muhammad Waseem   +2 more
semanticscholar   +1 more source

A Public Key Cryptosystem Using a Group of Permutation Polynomials

open access: yesTatra Mountains Mathematical Publications, 2020
In this paper we propose an efficient multivariate encryption scheme based on permutation polynomials over finite fields. We single out a commutative group ℒ(q, m) of permutation polynomials over the finite field Fqm. We construct a trapdoor function for
Rajesh P. Singh, B. K. Sarma, A. Saikia
semanticscholar   +1 more source

Repairing the Faure-Loidreau Public-Key Cryptosystem [PDF]

open access: yesInternational Symposium on Information Theory, 2018
A repair of the Faure-Loidreau (FL) public-key code-based cryptosystem is proposed. The FL cryptosystem is based on the hardness of list decoding Gabidulin codes which are special rank-metric codes.
A. Wachter-Zeh   +2 more
semanticscholar   +1 more source

A lightweight McEliece cryptosystem co-processor design [PDF]

open access: yes, 2020
Due to the rapid advances in the development of quantum computers and their susceptibility to errors, there is a renewed interest in error correction algorithms.
Agrawal, Rashmi   +3 more
core   +2 more sources

PKC-PC: A Variant of the McEliece Public Key Cryptosystem based on Polar Codes [PDF]

open access: yesIET Communications, 2017
Polar codes are novel and efficient error correcting codes with low encoding and decoding complexities. These codes have a channel dependent generator matrix which is determined by the code dimension, code length and transmission channel parameters. This
Reza Hooshmand   +2 more
semanticscholar   +1 more source

A Group-Based NTRU-Like Public-Key Cryptosystem for IoT

open access: yesIEEE Access, 2019
The Internet of things have been widely used to improve our daily life. Public-key cryptosystem plays a central role in the security of IoT. However, classic public-key cryptosystems such as RSA and ECC are not suitable for IoT because of the complicated
Li Shuai   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy