Results 41 to 50 of about 19,147 (192)
Hexi McEliece Public Key Cryptosystem [PDF]
This paper introduces a new class of hexi codes namely, hexi polynomial codes, hexi Rank Distance codes, hexi Maximum Rank Distance codes, hexi Goppa codes and hexi wild Goppa codes. These codes are useful to create variants of the McEliece public key cryptosystem known as the hexi McEliece public key cryptosystem and its variants; these cryptosystems ...
K. Ilanthenral, K. S. Easwarakumar
openaire +1 more source
ABSTRACT E‐learning systems in an educational environment designed for wireless area networks for schools, universities, and research institutions provide consistency and better retention for students, professors, and researchers. An E‐learning system is known for storing lecture documents and live video conferences that are transmitted over public ...
Ahmed A. Mawgoud +4 more
wiley +1 more source
Quantum Public-Key Cryptosystems [PDF]
This paper presents a new paradigm of cryptography, quantum public-key cryptosystems. In quantum public-key cryptosystems, all parties including senders, receivers and adversaries are modeled as quantum (probabilistic) poly-time Turing (QPT) machines and only classical channels (i.e., no quantum channels) are employed.
Tatsuaki Okamoto +2 more
openaire +1 more source
Fraud Detection in Privacy Preserving Health Insurance System Using Blockchain Technology
A privacy‐preserving and fraud‐detection‐enabled health insurance claim system has been proposed that addresses the dual challenges of privacy preservation and fraud detection in health insurance claims. The proposed model enables both patients and healthcare providers to submit claims securely, ensuring patient anonymity while effectively detecting ...
Md. Mazharul Islam +4 more
wiley +1 more source
An Improved RSA based on Double Even Magic Square of order 32 [PDF]
Because of the computers systems discovery and the use of computer networks between countries, security is very important to transfer confidential information over the networks; traditional cryptographic systems such as Rivest-Shamir-Adlemen (RSA) are ...
Shahla Uthman Umar
doaj +1 more source
ABSTRACT Integer and modular arithmetic is a fundamental area of mathematics, with extensive applications in computer science, and is essential for cryptographic protocols, error correction, and algorithm efficiency. However, students often struggle to understand its abstract nature, especially when transitioning from theoretical knowledge to practical
Violeta Migallón +2 more
wiley +1 more source
How Can Cryptography Secure Online Assessments Against Academic Dishonesty?
ABSTRACT Popular learning platforms like Canvas LMS (Learning Management System), Moodle, and Google Forms have become widespread among university students. This research focuses on these platforms because of their significant role in modern online education.
Aarav Ashish Mehrishi +2 more
wiley +1 more source
Adaptive DNA Cryptography With Intelligent Machine Learning for Cloud Data Defense
Algorithm 2 outlines the process of decrypting DNA‐encoded data retrieved from cloud storage. The DNA‐encoded fragments are first retrieved from the cloud and then concatenated to reconstruct the complete DNA‐encoded data. Subsequently, the DNA sequence is decoded back into encrypted digital data using the reverse of the defined encoding scheme ...
Animesh Kairi +4 more
wiley +1 more source
A new cryptosystem analogous to LUCELG and Cramer-Shoup [PDF]
A special group based on a linear recurrence equation plays an important role in modern cryptography. Its relation appeared differently in various cryptosystem.
Md. Said, Mohamad Rushdan +1 more
core
Post-quantum cryptographic hardware primitives [PDF]
The development and implementation of post-quantum cryptosystems have become a pressing issue in the design of secure computing systems, as general quantum computers have become more feasible in the last two years.
Agrawal, Rashmi +3 more
core

