Results 31 to 40 of about 19,147 (192)

A Secure and Robust Blockchain‐Based Medical Image Encryption Approach Using Lorenz Chaotic System

open access: yesJournal of Sensors, Volume 2026, Issue 1, 2026.
Keeping medical images confidential while transmitting is crucial, especially in an open networking environment. One effective approach is blockchain‐based encryption, which provides strong security for sensitive healthcare data. To ensure the greatest levels of medical data integrity and authenticity, our proposed scheme employs a unique Lorenz ...
Fahima Hajjej   +4 more
wiley   +1 more source

RSA: A number of formulas to improve the search for p+qp+q

open access: yesJournal of Mathematical Cryptology, 2017
Breaking RSA is one of the fundamental problems in cryptography. Due to its reliance on the difficulty of the integer factorization problem, no efficient solution has been found despite decades of extensive research. One of the possible ways to break RSA
Mohammed Ahmed, Alkhelaifi Abdulrahman
doaj   +1 more source

Enriching Information Security via Hybrid of New Expand Rivest Shamir Adleman and Data Encryption Standard Cryptosystem

open access: yesJournal of Applied Sciences and Environmental Management, 2023
Cryptography system gives security services ability to protect information from people who are authorized to use it. This research introduces elevated information security system via hybrid of new expand Rivest Shamir Adleman (RSA) and data encryption ...
M. B. Hammawa   +2 more
doaj   +1 more source

PERBANDINGAN ALGORITMA DALAM ENKRIPSI ANTARA CONVENTIONAL CRYPTOSYSTEMS DAN PUBLIC KEY CRYPTOSYSTEM [PDF]

open access: yes, 2002
Artikel ini menjelaskan tentang perbandingan dua algoritma enkripsi antara conventional cryptosystem dan public key ...
MUKODIM, DIDIN, UMINATI, NAELI
core  

LWE Public Key Cryptosystem

open access: yes, 2022
AbstractIn 2005, O.Regev proposed the first LWE public key cryptosystem at Tel Aviv University in Israel based on LWE distribution $$A_{s,\chi }$$. Because of this paper, Regev won the highest award for theoretical computer science in 2018—the Godel Award.
Zhiyong Zheng, Kun Tian, Fengxia Liu
openaire   +1 more source

An adaptive block‐wise prediction error‐based (AdaBPE) reversible data hiding in encrypted images for medical image transmission

open access: yesCAAI Transactions on Intelligence Technology, Volume 10, Issue 5, Page 1269-1290, October 2025.
Abstract Life expectancy has improved with new‐age technologies and advancements in the healthcare sector. Though artificial intelligence (AI) and the Internet of Things (IoT) are revolutionising smart healthcare systems, security of the healthcare data is always a concern.
Shaiju Panchikkil   +4 more
wiley   +1 more source

A McEliece cryptosystem using permutation codes

open access: yesJournal of Mathematical Cryptology
This paper is an attempt to build a new public-key cryptosystem, similar to the McEliece cryptosystem, using permutation error-correcting codes. We study a public-key cryptosystem built using two permutation error-correcting codes.
Srinivasan Adarsh, Mahalanobis Ayan
doaj   +1 more source

Hardware Security in the Connected World

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 15, Issue 3, September 2025.
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee   +4 more
wiley   +1 more source

AN IDEA FOR KNAPSACK CRYPTOSYSTEM BACKDOOR

open access: yesБезопасность информационных технологий
There are practically no known backdoors in a knapsack cryptosystem, the security of which is based on the difficulty of solving the knapsack packing problem.
Mikhail A. Ivanov
doaj   +1 more source

On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight

open access: yesIEEE Access, 2023
One of the Round 3 Finalists in the NIST post-quantum cryptography call is the Classic McEliece cryptosystem. Although it is one of the most secure cryptosystems, the large size of its public key remains a practical limitation. In this work, we propose a
Luca Mariot   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy