Results 81 to 90 of about 32,597 (206)
Quantum-Resilient Cryptography: A Survey on Classical and Quantum Algorithms
The rapid advancement of quantum computing is poised to disrupt the foundations of classical cryptography, calling into question the long-term security of widely used algorithms. Classical cryptographic techniques, including symmetric key algorithms like
H. A. Sharath +3 more
doaj +1 more source
Group theory in cryptography [PDF]
This paper is a guide for the pure mathematician who would like to know more about cryptography based on group theory. The paper gives a brief overview of the subject, and provides pointers to good textbooks, key research papers and recent survey papers ...
Blackburn, Simon R. +2 more
core
ABSTRACT Introduction The popularization of blockchain‐based applications made evident a critical challenge, namely the inherent isolation of these decentralized systems, akin to the disconnected and technologically diverse local area networks of the 1970s. This lack of interoperability limits the potential for widespread adoption and innovation in the
Christian Delgado‐von‐Eitzen +3 more
wiley +1 more source
Year 2010 Issues on Cryptographic Algorithms [PDF]
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core
Illuminating Advances in Materials: Optical Physical Unclonable Functions for Security Applications
This review highlights Optical Physical Unclonable Functions (OPUFs) as secure, light‐driven authentication tools. It surveys material platforms including optical fibers, low‐dimensional materials, luminophores, plasmonic nanoparticles and rare earth OPUFs systems.
Syeda Ramsha Ali +4 more
wiley +1 more source
This work presents a secure telemedicine cryptosystem based on a novel 4D memristive chaotic oscillator and a Dispatched Gray Code Scrambler (DGCS). Implemented on FPGA, the system ensures power‐efficient encryption, making it suitable for real‐time medical image transmission in IoT healthcare environments.
Fritz Nguemo Kemdoum +3 more
wiley +1 more source
Omega network hash construction [PDF]
Cryptographic hash functions are very common and important cryptographic primitives. They are commonly used for data integrity checking and data authentication.
Chuah, Chai Wen
core
StorjLedger leverages erasure‐coded sharding and Proof‐of‐Storage to deliver nearly 1000 transactions per second with sub‐second latency, 98% data redundancy, and 76% lower storage costs, resolving the blockchain trilemma by harmonizing scalability, security, and decentralization.
Saha Reno, Koushik Roy
wiley +1 more source
ABSTRACT Medical images play a crucial role in diagnosis, treatment procedures and overall healthcare. Nevertheless, they also pose substantial risks to patient confidentiality and safety. Safeguarding the confidentiality of patients' data has become an urgent and practical concern.
Mohamed Meselhy Eltoukhy +3 more
wiley +1 more source
Mathematical Foundations and Implementation of CONIKS Key Transparency
This research paper explores the CONIKS key management system’s security and efficiency, a system designed to ensure transparency and privacy in cryptographic operations.
Elissa Mollakuqe +2 more
doaj +1 more source

