Results 81 to 90 of about 32,597 (206)

Quantum-Resilient Cryptography: A Survey on Classical and Quantum Algorithms

open access: yesIEEE Access
The rapid advancement of quantum computing is poised to disrupt the foundations of classical cryptography, calling into question the long-term security of widely used algorithms. Classical cryptographic techniques, including symmetric key algorithms like
H. A. Sharath   +3 more
doaj   +1 more source

Group theory in cryptography [PDF]

open access: yes, 2010
This paper is a guide for the pure mathematician who would like to know more about cryptography based on group theory. The paper gives a brief overview of the subject, and provides pointers to good textbooks, key research papers and recent survey papers ...
Blackburn, Simon R.   +2 more
core  

Bridging the Gap: Achieving Seamless Interoperability Between Ethereum‐Based Blockchains Using Inter‐Blockchain Communication Protocols

open access: yesSoftware: Practice and Experience, Volume 55, Issue 11, Page 1749-1772, November 2025.
ABSTRACT Introduction The popularization of blockchain‐based applications made evident a critical challenge, namely the inherent isolation of these decentralized systems, akin to the disconnected and technologically diverse local area networks of the 1970s. This lack of interoperability limits the potential for widespread adoption and innovation in the
Christian Delgado‐von‐Eitzen   +3 more
wiley   +1 more source

Year 2010 Issues on Cryptographic Algorithms [PDF]

open access: yes
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core  

Illuminating Advances in Materials: Optical Physical Unclonable Functions for Security Applications

open access: yesAdvanced Optical Materials, Volume 13, Issue 29, October 13, 2025.
This review highlights Optical Physical Unclonable Functions (OPUFs) as secure, light‐driven authentication tools. It surveys material platforms including optical fibers, low‐dimensional materials, luminophores, plasmonic nanoparticles and rare earth OPUFs systems.
Syeda Ramsha Ali   +4 more
wiley   +1 more source

Hardware Design for Secure Telemedicine Using A Novel Framework, A New 4D Memristive Chaotic Oscillator, and Dispatched Gray Code Scrambler

open access: yesEngineering Reports, Volume 7, Issue 10, October 2025.
This work presents a secure telemedicine cryptosystem based on a novel 4D memristive chaotic oscillator and a Dispatched Gray Code Scrambler (DGCS). Implemented on FPGA, the system ensures power‐efficient encryption, making it suitable for real‐time medical image transmission in IoT healthcare environments.
Fritz Nguemo Kemdoum   +3 more
wiley   +1 more source

Omega network hash construction [PDF]

open access: yes, 2009
Cryptographic hash functions are very common and important cryptographic primitives. They are commonly used for data integrity checking and data authentication.
Chuah, Chai Wen
core  

StorjLedger: An Innovative Distributed Storage Ecosystem That Overcomes Blockchain Trade‐Offs Using Erasure‐Coded Sharding and Proof‐of‐Storage Consensus

open access: yesEngineering Reports, Volume 7, Issue 10, October 2025.
StorjLedger leverages erasure‐coded sharding and Proof‐of‐Storage to deliver nearly 1000 transactions per second with sub‐second latency, 98% data redundancy, and 76% lower storage costs, resolving the blockchain trilemma by harmonizing scalability, security, and decentralization.
Saha Reno, Koushik Roy
wiley   +1 more source

RDHNet: Reversible Data Hiding Method for Securing Colour Images Using AlexNet and Watershed Transform in a Fusion Domain

open access: yesCAAI Transactions on Intelligence Technology, Volume 10, Issue 5, Page 1422-1445, October 2025.
ABSTRACT Medical images play a crucial role in diagnosis, treatment procedures and overall healthcare. Nevertheless, they also pose substantial risks to patient confidentiality and safety. Safeguarding the confidentiality of patients' data has become an urgent and practical concern.
Mohamed Meselhy Eltoukhy   +3 more
wiley   +1 more source

Mathematical Foundations and Implementation of CONIKS Key Transparency

open access: yesApplied Sciences
This research paper explores the CONIKS key management system’s security and efficiency, a system designed to ensure transparency and privacy in cryptographic operations.
Elissa Mollakuqe   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy