Results 71 to 80 of about 1,492,941 (204)
FPGA Realization of a Novel Hyperchaos Augmented Image Encryption Algorithm
With the rapid growth of multimedia communication, protecting image data has become increasingly critical. This article proposes a novel 3‐stage hyperchaos‐based augmented image encryption technique (3SHAIET) that utilizes a three‐stage process with chaotic systems of increasing dimensionality (e.g., six‐dimensional [6D], 8D, and 9D) to enhance ...
Wassim Alexan +6 more
wiley +1 more source
Depolarizing Channel Mismatch and Estimation Protocols for Quantum Turbo Codes
Quantum turbo codes (QTC) have shown excellent error correction capabilities in the setting of quantum communication, achieving a performance less than 1 dB away from their corresponding hashing bounds.
Josu Etxezarreta Martinez +2 more
doaj +1 more source
Hyperchaos‐Driven 3D RGB Image Scrambling and Encryption for Multi‐Image Security
The proposed encryption scheme scrambles N colour images by stacking them into a three‐dimensional red, green, blue image, generating a secure 256‐bit key using SHA‐256 and a user‐provided salt, and applying a five‐dimensional multi‐wing hyperchaotic system to produce random key streams.
Muhammad Hanif +6 more
wiley +1 more source
We introduce a novel, \textit{fully} quantum hash (FQH) function within the quantum walk on a cycle framework. We incorporate deterministic quantum computation with a single qubit to replace classical post-processing, thus increasing the inherent security. Further, our proposed hash function exhibits zero collision rate and high reliability. We further
Banerjee, Shreya +3 more
openaire +2 more sources
Enhancing E‐Commerce Security Based on Involution Function Using Twin Key AES Cipher
In the realm of surging e‐commerce data and increasing digital transactions, ensuring end‐to‐end security is paramount to protect sensitive information and maintain user trust. The Advanced Encryption Standard (AES), a cornerstone of network security, relies on symmetric key encryption for secure communication.
Biresh Kumar +11 more
wiley +1 more source
Information Encryption Algorithm Using a Discrete Quantum Map
A complex encryption algorithm has been developed based on traditional RSA (public key encryption algorithm), SHA-3 (hashing algorithm), and a discrete quantum map.
A. V. Sidorenko, E. A. Vysotskaya
doaj +1 more source
This paper addresses the limitations of existing conditional privacy‐preserving authentication (CPPA) schemes in vehicular ad hoc networks (VANETs), which are either computationally heavy or vulnerable to quantum attacks. It proposes a multi‐aggregator lattice‐based CPPA (MA‐LCPPA) framework that distributes verification across multiple roadside units ...
Adi El‐Dalahmeh, Jie Li
wiley +1 more source
Depth-Optimized Quantum Circuits for ASCON: AEAD and HASH
Quantum computing advancements pose security challenges for cryptography. Specifically, Grover’s search algorithm affects the reduction in the search complexity of symmetric-key encryption and hash functions. Recent efforts have been made to estimate the
Yujin Oh +3 more
doaj +1 more source
Quantum Key Distribution Networks Design: Overview and Challenges
This paper explores the potential of using established QKD network design techniques in the context of quantum key distribution, which is based on the principles of quantum mechanics. ABSTRACT Quantum cryptography has increasingly attracted interest from both industry and academia for its potential in real‐world applications.
Pankaj Kumar +2 more
wiley +1 more source
The modern metropolis essentially demands the use of state‐of‐the‐art, real‐time surveillance systems, which should be reliable, scalable, and respectful of privacy at the same time. Critical shortcomings in traditional architectures are single points of failure, poor scalability, frequent data breaches, and inadequately managed privacy.
Shihab Sarar +4 more
wiley +1 more source

