Search
Search Results
-
Text Encryption Scheme Based on Chaotic Map and DNA Strand Displacement
A text encryption scheme is proposed by combining chaotic map, DNA encoding and DNA strand displacement (DSD). The scheme firstly scrambles the... -
Parameter optimization of chaotic system using Pareto-based triple objective artificial bee colony algorithm
Chaotic map is a kind of discrete chaotic system. The existing chaotic maps suffer from optimal parameters in terms of chaos measurements. In this...
-
A new image encryption approach that uses an improved Hill-Vigenère method and chaotic maps
Image encryption is an interesting field of research that is an adequate solution to ensure the safety and security of private information from...
-
Construction of high-dimensional cyclic symmetric chaotic map with one-dimensional chaotic map and its security application
Classical one-dimensional chaotic map has many ideal characteristics which is quite suitable for many different kinds of scientific fields,...
-
Image encryption based on S-box generation constructed by using a chaotic autonomous snap system with only one equilibrium point
An autonomous chaotic snap system with only one equilibrium point is proposed and analyzed in this paper. Periodic oscillations, self-excited chaotic...
-
A Closer Look at Attacks on Lightweight Cryptosystems: Threats and Countermeasures
Cryptosystems are fundamental to securing digital communication and information exchange in our interconnected world. However, as technology... -
A symmetric image encryption scheme based on hybrid analog-digital chaotic system and parameter selection mechanism
In recent years, various chaos-based image encryption algorithms have been proposed to meet the growing demand for real-time secure image...
-
Symmetric and Asymmetric Cryptography on the Special Linear Cracovian Quasigroup
We propose symmetric and public key cryptographic protocols on the non-associative special linear Cracovian quasigroup. The... -
CTEA: Chaos based tiny encryption algorithm using ECDH and TinkerBell map for data security in supply chain management
Supply chain management (SCM), an essential part of E-Commerce, is required to plan, control, and procurement raw materials, manufacturing, and...
-
A joint image compression and encryption scheme based on a novel coupled map lattice system and DNA operations
In this paper, an efficient image encryption scheme based on a novel mixed linear–nonlinear coupled map lattice (NMLNCML) system and DNA operations...
-
Design and Implementation of Multilayer Encryption for Audio File Security
Using audio encryption, secure information can be transmitted. By doing this, Sender and Receiver audio security is guaranteed. The security of... -
A novel secure cryptography model for data transmission based on Rotor64 technique
In recent years, there have been many Security vulnerabilities that threaten user security, these threats have led to the finding of user files, so...
-
Implementation of Homomorphic Encryption Schemes in Fog Computing
In today's date, fog computing is on the rise due to its characteristics. Its ability to provide smart devices with close-by computing capabilities... -
Securing Shared Data Based on Homomorphic Encryption Schemes
Today, in this modern world, privacy plays a significant role where the data is available everywhere. Because of utilization of large amount of... -
An Introduction to Classical and Modern Cryptography
The remote environment bounded us to share information, documents, money, etc. with the help of applications, devices, and tools. The information,... -
Codes and Secret Messages: From the Ancient Origins of Steganography and Cryptography and their Relevance to Today
The Art of War concludes with the chapter on espionage and the use of secret agents. About them, Sun Tzu also says: “They are a ruler’s treasure.”... -
The Lone Cryptologists: Escape from Riverbank
The Friedmans were back at Riverbank by the summer of 1919, and they had cause to immediately regret their decision. William spent time finishing up... -
A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm
In the era of digital communication and data security, image encryption plays a crucial role in safeguarding sensitive information. Protecting...
-
Study of Various Attacks Over Images Transferred Optically Through Communication Channel
On the basis of double random phase encoding (DRPE), we present an improved picture encryption technique in this work. In order to protect images... -
Blockchain-Based EMR Enhancement: Introducing PMI-Chain for Improved Medical Data Security and Privacy
We have created a solution called PMI-Chain to address the challenges faced by Electronic Medical Records (EMR) management systems. These challenges...