Results 41 to 50 of about 19,147 (192)

Hexi McEliece Public Key Cryptosystem [PDF]

open access: yesApplied Mathematics & Information Sciences, 2014
This paper introduces a new class of hexi codes namely, hexi polynomial codes, hexi Rank Distance codes, hexi Maximum Rank Distance codes, hexi Goppa codes and hexi wild Goppa codes. These codes are useful to create variants of the McEliece public key cryptosystem known as the hexi McEliece public key cryptosystem and its variants; these cryptosystems ...
K. Ilanthenral, K. S. Easwarakumar
openaire   +1 more source

Enhancing Data Privacy and Trust in E‐Learning: A Blockchain‐Based Access Control Protocol for Cloud Educational Systems

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 18-20, 30 August 2025.
ABSTRACT E‐learning systems in an educational environment designed for wireless area networks for schools, universities, and research institutions provide consistency and better retention for students, professors, and researchers. An E‐learning system is known for storing lecture documents and live video conferences that are transmitted over public ...
Ahmed A. Mawgoud   +4 more
wiley   +1 more source

Quantum Public-Key Cryptosystems [PDF]

open access: yes, 2000
This paper presents a new paradigm of cryptography, quantum public-key cryptosystems. In quantum public-key cryptosystems, all parties including senders, receivers and adversaries are modeled as quantum (probabilistic) poly-time Turing (QPT) machines and only classical channels (i.e., no quantum channels) are employed.
Tatsuaki Okamoto   +2 more
openaire   +1 more source

Fraud Detection in Privacy Preserving Health Insurance System Using Blockchain Technology

open access: yesEngineering Reports, Volume 7, Issue 8, August 2025.
A privacy‐preserving and fraud‐detection‐enabled health insurance claim system has been proposed that addresses the dual challenges of privacy preservation and fraud detection in health insurance claims. The proposed model enables both patients and healthcare providers to submit claims securely, ensuring patient anonymity while effectively detecting ...
Md. Mazharul Islam   +4 more
wiley   +1 more source

An Improved RSA based on Double Even Magic Square of order 32 [PDF]

open access: yesKirkuk Journal of Science, 2017
Because of the computers systems discovery and the use of computer networks between countries, security is very important to transfer confidential information over the networks; traditional cryptographic systems such as Rivest-Shamir-Adlemen (RSA) are ...
Shahla Uthman Umar
doaj   +1 more source

ArtEM: Enhancing the Understanding of Integer and Modular Arithmetic Through Interactive Learning Software

open access: yesComputer Applications in Engineering Education, Volume 33, Issue 4, July 2025.
ABSTRACT Integer and modular arithmetic is a fundamental area of mathematics, with extensive applications in computer science, and is essential for cryptographic protocols, error correction, and algorithm efficiency. However, students often struggle to understand its abstract nature, especially when transitioning from theoretical knowledge to practical
Violeta Migallón   +2 more
wiley   +1 more source

How Can Cryptography Secure Online Assessments Against Academic Dishonesty?

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 4, July/August 2025.
ABSTRACT Popular learning platforms like Canvas LMS (Learning Management System), Moodle, and Google Forms have become widespread among university students. This research focuses on these platforms because of their significant role in modern online education.
Aarav Ashish Mehrishi   +2 more
wiley   +1 more source

Adaptive DNA Cryptography With Intelligent Machine Learning for Cloud Data Defense

open access: yesEngineering Reports, Volume 7, Issue 6, June 2025.
Algorithm 2 outlines the process of decrypting DNA‐encoded data retrieved from cloud storage. The DNA‐encoded fragments are first retrieved from the cloud and then concatenated to reconstruct the complete DNA‐encoded data. Subsequently, the DNA sequence is decoded back into encrypted digital data using the reverse of the defined encoding scheme ...
Animesh Kairi   +4 more
wiley   +1 more source

A new cryptosystem analogous to LUCELG and Cramer-Shoup [PDF]

open access: yes, 2009
A special group based on a linear recurrence equation plays an important role in modern cryptography. Its relation appeared differently in various cryptosystem.
Md. Said, Mohamad Rushdan   +1 more
core  

Post-quantum cryptographic hardware primitives [PDF]

open access: yes, 2020
The development and implementation of post-quantum cryptosystems have become a pressing issue in the design of secure computing systems, as general quantum computers have become more feasible in the last two years.
Agrawal, Rashmi   +3 more
core  

Home - About - Disclaimer - Privacy