Results 31 to 40 of about 19,193 (189)

A Comparative Study of Decision Tree, RNNs and CNNs for Detection of False Data Injection Attacks in Cyber‐Physical Power Systems

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 11, Issue 1, January/December 2026.
Intrusion detection for FDIAs is proposed using three approaches. (1) a stack‐based model containing an expansion decision tree and neural network, (2) recurrent neural networks (RNNs) and (3) convolutional neural networks (CNNs). The first two methods are based on the initial preprocessing of row instances, whereas the last one involves the time ...
Zeeshan Haider   +3 more
wiley   +1 more source

Enriching Information Security via Hybrid of New Expand Rivest Shamir Adleman and Data Encryption Standard Cryptosystem

open access: yesJournal of Applied Sciences and Environmental Management, 2023
Cryptography system gives security services ability to protect information from people who are authorized to use it. This research introduces elevated information security system via hybrid of new expand Rivest Shamir Adleman (RSA) and data encryption ...
M. B. Hammawa   +2 more
doaj   +1 more source

AAβ-Cryptosystem: a chaos based public key cryptosystem [PDF]

open access: yes, 2009
We describe the AAβ-cryptosystem, a new public key cryptosystem that is built by utilizing the classical one-way chaotic beta-transformati on mapping given by by fβ=βx (mod 1). The AAb-cryptosystem represents its private keys as a vector dA and uses the
Kamel Ariffin, Muhammad Rezal   +1 more
core  

LWE Public Key Cryptosystem

open access: yes, 2022
AbstractIn 2005, O.Regev proposed the first LWE public key cryptosystem at Tel Aviv University in Israel based on LWE distribution $$A_{s,\chi }$$. Because of this paper, Regev won the highest award for theoretical computer science in 2018—the Godel Award.
Zhiyong Zheng, Kun Tian, Fengxia Liu
openaire   +1 more source

Hyperchaos‐Driven 3D RGB Image Scrambling and Encryption for Multi‐Image Security

open access: yesIET Image Processing, Volume 20, Issue 1, January/December 2026.
The proposed encryption scheme scrambles N colour images by stacking them into a three‐dimensional red, green, blue image, generating a secure 256‐bit key using SHA‐256 and a user‐provided salt, and applying a five‐dimensional multi‐wing hyperchaotic system to produce random key streams.
Muhammad Hanif   +6 more
wiley   +1 more source

A McEliece cryptosystem using permutation codes

open access: yesJournal of Mathematical Cryptology
This paper is an attempt to build a new public-key cryptosystem, similar to the McEliece cryptosystem, using permutation error-correcting codes. We study a public-key cryptosystem built using two permutation error-correcting codes.
Srinivasan Adarsh, Mahalanobis Ayan
doaj   +1 more source

AN IDEA FOR KNAPSACK CRYPTOSYSTEM BACKDOOR

open access: yesБезопасность информационных технологий
There are practically no known backdoors in a knapsack cryptosystem, the security of which is based on the difficulty of solving the knapsack packing problem.
Mikhail A. Ivanov
doaj   +1 more source

On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight

open access: yesIEEE Access, 2023
One of the Round 3 Finalists in the NIST post-quantum cryptography call is the Classic McEliece cryptosystem. Although it is one of the most secure cryptosystems, the large size of its public key remains a practical limitation. In this work, we propose a
Luca Mariot   +2 more
doaj   +1 more source

Enhancing E‐Commerce Security Based on Involution Function Using Twin Key AES Cipher

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
In the realm of surging e‐commerce data and increasing digital transactions, ensuring end‐to‐end security is paramount to protect sensitive information and maintain user trust. The Advanced Encryption Standard (AES), a cornerstone of network security, relies on symmetric key encryption for secure communication.
Biresh Kumar   +11 more
wiley   +1 more source

Hexi McEliece Public Key Cryptosystem [PDF]

open access: yesApplied Mathematics & Information Sciences, 2014
This paper introduces a new class of hexi codes namely, hexi polynomial codes, hexi Rank Distance codes, hexi Maximum Rank Distance codes, hexi Goppa codes and hexi wild Goppa codes. These codes are useful to create variants of the McEliece public key cryptosystem known as the hexi McEliece public key cryptosystem and its variants; these cryptosystems ...
K. Ilanthenral, K. S. Easwarakumar
openaire   +1 more source

Home - About - Disclaimer - Privacy