Results 41 to 50 of about 482,791 (290)

An Efficient Generation and Security Analysis of Substitution Box Using Fingerprint Patterns

open access: yesIEEE Access, 2020
Information and its security have attracted the research community in recent years with increasing usage of mobile applications. Mobile devices have different security options in data transmission such as reading some biometric values.
Oznur Sengel   +2 more
doaj   +1 more source

Substitution box generation using Chaos: An image encryption application

open access: yesApplied Mathematics and Computation, 2018
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
V.M. Silva-García   +4 more
openaire   +1 more source

Quantum Half and Full Spinning Operator-Based Nonlinear Confusion Component

open access: yesIEEE Access, 2021
The structure of a substitution box (S-box) is one of the principal ideas of the modern encryption techniques. The security of a modern encryption algorithm highly depends on its nonlinear confusion component.
Abdullah Alghafis
doaj   +1 more source

A Novel Latin Square Image Cipher

open access: yes, 2012
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color images. Our contributions to the image encryption community include 1) we develop new Latin square image encryption primitives including Latin Square ...
Aaronson   +45 more
core   +1 more source

Infinitary $\lambda$-Calculi from a Linear Perspective (Long Version) [PDF]

open access: yes, 2016
We introduce a linear infinitary $\lambda$-calculus, called $\ell\Lambda_{\infty}$, in which two exponential modalities are available, the first one being the usual, finitary one, the other being the only construct interpreted coinductively. The obtained
Lago, Ugo Dal
core   +4 more sources

Multi-Objective Evolution of Strong S-Boxes Using Non-Dominated Sorting Genetic Algorithm-II and Chaos for Secure Telemedicine

open access: yesIEEE Access, 2022
There exist several performance criteria for cryptographically-strong substitution boxes (S-boxes), which are often conflicting with each other. Constructing S-boxes that satisfy multiple criteria with optimal tradeoffs is one of the challenging tasks ...
Musheer Ahmad   +5 more
doaj   +1 more source

Efficient Open World Reasoning for Planning [PDF]

open access: yes, 2006
We consider the problem of reasoning and planning with incomplete knowledge and deterministic actions. We introduce a knowledge representation scheme called PSIPLAN that can effectively represent incompleteness of an agent's knowledge while allowing for ...
Henry Kautz   +2 more
core   +1 more source

Mapping the evolution of mitochondrial complex I through structural variation

open access: yesFEBS Letters, EarlyView.
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin   +2 more
wiley   +1 more source

A Novel Virtual Optical Image Encryption Scheme Created by Combining Chaotic S-Box with Double Random Phase Encoding

open access: yesSensors, 2022
The double random phase encoding (DRPE) system plays a significant role in encrypted systems. However, it is a linear system that leads to security holes in encrypted systems.
Peiran Tian, Runzhou Su
doaj   +1 more source

Simple sentences, substitutions, and mistaken evaluations [PDF]

open access: yes, 2002
Many competent speakers initially judge that (i) is true and (ii) is false, though they know that (iii) is true. (i) Superman leaps more tall buildings than Clark Kent. (ii) Superman leaps more tall buildings than Superman.
Braun, D., Saul, J.M.
core   +1 more source

Home - About - Disclaimer - Privacy