Search
Search Results
-
BRIEFBCS: binary robust independent elementary features based fuzzy vault scheme in BCS
Biometric cryptosystem (BCS) is an emerging field which performs user authentication in a secured environment. User authentication is handled using...
-
A novel pseudo-random number assisted fast image encryption algorithm
Image information encryption is an essential research direction in symmetric cryptography. A new digital image cryptosystem is proposed in this...
-
Blockchain-assisted post-quantum privacy-preserving public auditing scheme to secure multimedia data in cloud storage
With the escalation of multimedia data, cloud technology has played a very important role in its management with its promising computing and storage...
-
Security and Complexity of a New Variant of the McEliece Cryptosystem Using Non-linear Convolutional Codes
The McEliece public-key cryptography (PKC) has fewer encryption/decryption operations compared to other PKC schemes such as RSA, ECC, and ElGamal.... -
Classical Attacks on a Variant of the RSA Cryptosystem
Let \(N=pq\) be an RSA modulus with... -
Enhancing security with Aboodh transformation and S-box fusion in image encryption
The aim of this research is to create a novel cryptographic technique by incorporating Aboodh and its inverse transform into the S-Box method. The...
-
Comparative Study on the McEliece Public-Key Cryptosystem Based on Goppa and QC-MDPC Codes
In recent years, much research has been conducted on quantum computers – machine that exploit the phenomena of quantum mechanics to solve difficult... -
A new design of cryptosystem based on S-box and chaotic permutation
In this paper, we present a new design of cryptosystem characterized by an optimized substitution box (S-box) and random permutation. Our proposed...
-
Design criteria of a new code-based KEM
The advances in quantum technologies became a threat to cryptosystems based on number-theoretic approach. Therefore, the development of post-quantum...
-
An image cipher based on bio-molecular hyper chaotic system with dual diffusion scheme
Sensitive images are being transmitted over insecure media as network and information technology evolve at a rapid pace. As a result, people are...
-
Plaintext Related Optical Image Hybrid Encryption Based on Fractional Fourier Transform and Generalized Chaos of Multiple Controlling Parameters
Combining optical image encryption with digital image encryption, we propose a composed optical image hybrid encryption scheme in this paper. The...
-
Sooner Lightweight Cryptosystem: Towards Privacy Preservation of Resource-Constrained Devices
The use of cryptosystem became popular because of the increased need for exchanges across untrusted medium especially Internet-enabled networks. On... -
-
Image encryption scheme based on symmetric multimodal skew tent map
This paper proposes a novel scheme for image encryption based on symmetric multimodal skew tent map. The proposed map exhibits good statistical...
-
Biometric cryptosystems: a comprehensive survey
Biometric Cryptosystem (BCS) combines characteristics of both the fields: biometric and cryptosystem, where biometric provides authentication and...
-
-
A New Code-Based Cryptosystem
Unlike most papers devoted to improvements of code-based cryptosystem, where original Goppa codes are substituted by some other codes, we suggest a... -
A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap \(2^k\) -Residuosity Assumption
We present a novel public key encryption scheme that enables users to exchange many bits messages by means of at least two large prime numbers in a... -
Security enhanced privacy-preserving data aggregation scheme for intelligent transportation system
The intelligent transportation system can make traffic decisions through the sensory data collected by vehicles to ensure driving safety, improve...