Results 81 to 90 of about 224,759 (272)
On alternative approach for verifiable secret sharing [PDF]
Secret sharing allows split/distributed control over the secret (e.g. master key). Verifiable secret sharing (VSS) is the secret sharing extended by verification capacity. Usually verification comes at the price.
Kotulski, Zbigniew +2 more
core +2 more sources
Breaking Down Online and Digital Reporting Practices: A Research Map From Websites to Social Media
ABSTRACT This paper adopts a mixed research methodology, integrating bibliometric and systematic literature review (SLR) tools, to systematise the academic contributions and the different bodies of knowledge generated over the last decades on online and digital reporting practices, ranging from websites to social media.
Giuseppe Nicolò +3 more
wiley +1 more source
Lossless Secret Image Sharing Schemes
Secret image sharing deals with splitting confidential images into several shares and the original image can be reconstructed from the qualified subset of the shares. Secret sharing schemes are used in transmission and storage of private medical images and military secrets. Increased confidentiality and availability are the major achievements.
Binu, V. P., Sreekumar, A.
openaire +2 more sources
A New Strategy to Design Reconfigurable Rivest–Shamir–Adleman (RSA) Accelerators
A reconfigurable FPGA‐based RSA accelerator is proposed using compression‐based modular multipliers combined with pseudomoduli arithmetic. The approach maps modular exponentiation to low‐cost arithmetic domains and applies a correction stage, achieving significant improvements in delay, operating frequency, and delay–area efficiency compared with ...
Augusto C. B. Vassoler +4 more
wiley +1 more source
Secret Sharing using Image Hashing
paper presents a cryptographic technique that encrypts secret information using a coding image by transforming the pixels of this image from the intensity domain to the characters domain using a hash function. In the proposed technique, the coding image will be used to encrypt the secret information at the sender and decrypt it at the receiver using ...
openaire +1 more source
This study investigates the effect of the reaction temperature (step 1) and reaction time (step 1 and 2) on the conversion efficiency and impurity profile of amphetamine synthesized via the Leuckart method. Conversion efficiency and impurity profile were assessed using gas chromatography–flame ionization detection (GC–FID) and GC–mass spectrometry (GC ...
Maartje C. M. Verhoeven +7 more
wiley +1 more source
Two new color (n, n)-secret sharing schemes
Two methods of(n,n)-secret sharing scheme for color images were presented.Decryption was processed by XOR operation.The reconstruction complexity of the proposed scheme is equivalent to the visual secret sharing scheme,furthermore the quality of the ...
YI Feng +3 more
doaj +2 more sources
Lossless and Efficient Secret Image Sharing Based on Matrix Theory Modulo 256
Most of today’s secret image sharing (SIS) schemes are based on Shamir’s polynomial-based secret sharing (SS), which cannot recover pixels larger than 250. Many exiting methods of lossless recovery are not perfect, because several problems arise, such as
Long Yu +4 more
doaj +1 more source
The Great Dyke of Zimbabwe is notable for its rich platinum group metal deposits but poses significant geological and geotechnical challenges due to its complex rock types and structural features. Traditional pillar design methods are insufficient for addressing these complexities; the study suggests incorporating advanced techniques such as machine ...
Tawanda Zvarivadza +3 more
wiley +1 more source
LWE‐based verifiable essential secret image sharing scheme ((t,s,k,n)$( {t,s,k,n} )$ ‐ VESIS)
In traditional secret image sharing schemes, shareholders have similar situations, and to recover the secret image, they must be present as many as the threshold.
Massoud Hadian Dehkordi +2 more
doaj +1 more source

