We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 1,894 results
  1. XECryptoGA: a metaheuristic algorithm-based block cipher to enhance the security goals

    Cloud computing has become a pivotal component of all digital organizations and its adoption poses many security concerns for organizations’ data and...

    Md Saquib Jawed, Mohammad Sajid in Evolving Systems
    Article 21 September 2022
  2. Device-compatible ultra-high-order quantum noise stream cipher based on delta-sigma modulator and optical chaos

    Data security is a key feature of future communications networks. Physical layer introduces rich physical mechanisms to increase the complexity of...

    Hanwen Luo, Ziheng Zhang, ... Mengfan Cheng in Communications Engineering
    Article Open access 07 February 2024
  3. Qualitative and Quantitative Analysis of Modifications in Playfair Cipher

    Security in digital world has become a paramount issue, even more so in the post pandemic world when the digital footprint of the world has...
    Anubhab Ray, Kartikeya Singh, ... Nirmalya Kar in Computational Intelligence in Communications and Business Analytics
    Conference paper 2024
  4. Advanced biometric system security: a novel hybrid approach integrating optical asymmetric PTFT and symmetric cipher techniques

    The rapidly evolving field of biometric recognition and verification technologies has seen substantial progress recently. However, the storage of...

    Fatma A. Hossam Eldein Mohamed, Walid El-Shafai, ... Moustafa H. Aly in Optical and Quantum Electronics
    Article 25 April 2024
  5. Partially identified Babassu cipher and attack on it

    In the present article, we consider a new class of one-pad ciphers. We define its encryption algorithm as a partial function with two arguments. The...

    A. V. Babash, E. К. Baranova in Journal of Computer Virology and Hacking Techniques
    Article 01 March 2022
  6. Performing Cryptanalysis on the Secure Way of Communication Using Purple Cipher Machine

    Given the large amount of data that is available, it is vital to protect data. The main goal of cryptography is creating and analyzing methods to...
    V. P. Srinidhi, B. Vineetha, ... Prasad B. Honnavali in Emerging Research in Computing, Information, Communication and Applications
    Conference paper 2023
  7. An Approach Towards Modification of Playfair Cipher Using 16 \(\times \) 16 Matrix

    The Play fair cipher is a popular polyalphabetic encryption. It mathematically secures information by encrypting the message with a key. The same key...
    Sarmistha Podder, Aditya Harsh, ... Nirmalya Kar in Advances in Data and Information Sciences
    Conference paper 2024
  8. A reversible system based on hybrid toggle radius-4 cellular automata and its application as a block cipher

    The one-dimensional cellular automata (CA) system detailed herein uses a hybrid mechanism to attain reversibility, and this approach is adapted to...

    Everton R. Lira, Heverton B. de Macêdo, ... Gina M. B. Oliveira in Natural Computing
    Article 25 March 2023
  9. Unsafe Mechanisms of Bluetooth, \(E_0\) Stream Cipher Cryptanalysis with Quantum Annealing

    Due to Shor’s and Grover’s algorithms, quantum computing has become one of the fastest-evolving areas in computational science. Nowadays, one of the...
    Mateusz Leśniak, Elżbieta Burek, Michał Wroński in Computational Science – ICCS 2024
    Conference paper 2024
  10. An image cipher based on bio-molecular hyper chaotic system with dual diffusion scheme

    Sensitive images are being transmitted over insecure media as network and information technology evolve at a rapid pace. As a result, people are...

    Sujarani Rajendran, Manivannan Doraipandian, ... Kannan Kirthivasan in Multimedia Tools and Applications
    Article 10 October 2023
  11. Graph Key-Based Encryption Technique for IoT Networks: Graph-Affine Cipher

    The Internet of things (IoT) is a cutting-edge paradigm that is getting a lot of attention in the realm of contemporary wireless telecommunications....
    Vasantha Sandhya Venu, Kiranmai Bejjam, ... Nikhil Kallepelly in Proceedings of the 2nd International Conference on Cognitive and Intelligent Computing
    Conference paper 2023
  12. A Novel Hybrid Cipher Using Cipher Squares for Better Security

    Cryptography uses encryption and decryption to secure information. In the field of Information Security, many algorithms have been devised to encrypt...
    Adilakshmi Visali Jayanthi in Data Intelligence and Cognitive Informatics
    Conference paper 2021
  13. Image cipher using image filtering with 3D DNA-based confusion and diffusion strategy

    In this paper, an image cipher is presented based on DNA sequence operations, image filtering and memrisitve chaotic system. Firstly, plain image is...

    Zhihua Gan, **uli Chai, ... **angjun Wu in Neural Computing and Applications
    Article 18 July 2021
  14. Securing Digital Images using Stream Cipher and MDS Matrix

    This is an improved and extended version of the paper presented in CVIP 2020 conference. Stream ciphers are extensively used over a wide range of...

    Abdul Gaffar, Anand B. Joshi, Dhanesh Kumar in SN Computer Science
    Article 16 September 2021
  15. Visual Cryptography Using Hill Cipher and Advanced Hill Cipher Techniques

    Visual cryptography is a method in cryptography which deals with encryption of visual information such as pictures or text in such a way that the...
    Jagadeesh Basavaiah, Audre Arlene Anthony, Chandrashekar Mohan Patil in Advances in VLSI, Signal Processing, Power Electronics, IoT, Communication and Embedded Systems
    Conference paper 2021
  16. Washington DC, 1917–1918

    With the outbreak of World War One Manly was put in charge of the Code and Cipher section of the American Black Chamber (MI-8) in Washington, D.C....
    Chapter 2024
  17. QUIET: Quatro-Inverse Exponential Cipher Technique

    Majority of the available traditional symmetric key cipher techniques rely on a single key encoding scheme to secure the data before transmitting it...
    Harshit Bhatia, Rahul Johari, Kalpana Gupta in Functional Encryption
    Chapter 2021
  18. Lightweight and secure cipher scheme for multi-homed systems

    Multiple access technologies allow a network to connect to two or more communication networks efficiently, to enhance system performance. They are...

    Hassan N. Noura, Reem Melki, ... Ali Chehab in Wireless Networks
    Article 06 June 2020
  19. Latin Square and Machine Learning Techniques Combined Algorithm for Image Encryption

    Multimedia data is crucial in the military, medical, forensics, social, etc., to transmit a large amount of data. Security of this sensitive...

    Sakshi Patel, V. Thanikaiselvan in Circuits, Systems, and Signal Processing
    Article 17 June 2023
  20. A hybrid authenticated image encryption scheme using elliptic curves for enhanced security

    The rapid evolution of digital technology has heightened concerns about the security of multimedia communication across vulnerable platforms. In...

    Shalini Gupta, Nitish, ... Arun Kumar Sharma in International Journal of Information Technology
    Article 12 March 2024
Did you find what you were looking for? Share feedback.