We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 81-100 of 10,000 results
  1. BRIEFBCS: binary robust independent elementary features based fuzzy vault scheme in BCS

    Biometric cryptosystem (BCS) is an emerging field which performs user authentication in a secured environment. User authentication is handled using...

    Prabhjot Kaur, Nitin Kumar in Cluster Computing
    Article 22 September 2023
  2. A novel pseudo-random number assisted fast image encryption algorithm

    Image information encryption is an essential research direction in symmetric cryptography. A new digital image cryptosystem is proposed in this...

    Aiguo Chen, Yong Zhang in Multimedia Tools and Applications
    Article 16 October 2023
  3. Blockchain-assisted post-quantum privacy-preserving public auditing scheme to secure multimedia data in cloud storage

    With the escalation of multimedia data, cloud technology has played a very important role in its management with its promising computing and storage...

    Deepika Gautam, Sunil Prajapat , ... Willy Susilo in Cluster Computing
    Article 07 April 2024
  4. Security and Complexity of a New Variant of the McEliece Cryptosystem Using Non-linear Convolutional Codes

    The McEliece public-key cryptography (PKC) has fewer encryption/decryption operations compared to other PKC schemes such as RSA, ECC, and ElGamal....
    Michael Ekonde Sone in E-Business and Telecommunications
    Conference paper 2021
  5. Classical Attacks on a Variant of the RSA Cryptosystem

    Let \(N=pq\) be an RSA modulus with...
    Abderrahmane Nitaj, Muhammad Rezal Bin Kamel Ariffin, ... Nur Azman Abu in Progress in Cryptology – LATINCRYPT 2021
    Conference paper 2021
  6. Enhancing security with Aboodh transformation and S-box fusion in image encryption

    The aim of this research is to create a novel cryptographic technique by incorporating Aboodh and its inverse transform into the S-Box method. The...

    Suresh Rasappan, Regan Murugesan, ... Nagadevi Bala Nagaram in International Journal of Information Technology
    Article 07 May 2024
  7. Comparative Study on the McEliece Public-Key Cryptosystem Based on Goppa and QC-MDPC Codes

    In recent years, much research has been conducted on quantum computers – machine that exploit the phenomena of quantum mechanics to solve difficult...
    Es-said Azougaghe, Abderrazak Farchane, ... Ali Azougaghe in Business Intelligence
    Conference paper 2021
  8. A new design of cryptosystem based on S-box and chaotic permutation

    In this paper, we present a new design of cryptosystem characterized by an optimized substitution box (S-box) and random permutation. Our proposed...

    M. A. Ben Farah, R. Guesmi, ... M. Samet in Multimedia Tools and Applications
    Article 18 March 2020
  9. Design criteria of a new code-based KEM

    The advances in quantum technologies became a threat to cryptosystems based on number-theoretic approach. Therefore, the development of post-quantum...

    Victoria Vysotskaya, Ivan Chizhov in Journal of Computer Virology and Hacking Techniques
    Article 13 June 2024
  10. An image cipher based on bio-molecular hyper chaotic system with dual diffusion scheme

    Sensitive images are being transmitted over insecure media as network and information technology evolve at a rapid pace. As a result, people are...

    Sujarani Rajendran, Manivannan Doraipandian, ... Kannan Kirthivasan in Multimedia Tools and Applications
    Article 10 October 2023
  11. Correction to: Image cryptosystem based on plain image correlation rate and selective chaotic maps

    Ahmad Pourjabbar Kari, Ahmad Habibizad Navin, ... Mirkamal Mirnia in Multimedia Tools and Applications
    Article 08 August 2022
  12. Plaintext Related Optical Image Hybrid Encryption Based on Fractional Fourier Transform and Generalized Chaos of Multiple Controlling Parameters

    Combining optical image encryption with digital image encryption, we propose a composed optical image hybrid encryption scheme in this paper. The...

    Limin Tao, ** Zhu in Journal of Grid Computing
    Article 14 March 2023
  13. Sooner Lightweight Cryptosystem: Towards Privacy Preservation of Resource-Constrained Devices

    The use of cryptosystem became popular because of the increased need for exchanges across untrusted medium especially Internet-enabled networks. On...
    Abraham Ayegba Alfa, John Kolo Alhassan, ... Morufu Olalere in Information and Communication Technology and Applications
    Conference paper 2021
  14. Cryptanalysis of the extension field cancellation cryptosystem

    Olive Chakraborty, Jean-Charles Faugère, Ludovic Perret in Designs, Codes and Cryptography
    Article 18 April 2021
  15. Image encryption scheme based on symmetric multimodal skew tent map

    This paper proposes a novel scheme for image encryption based on symmetric multimodal skew tent map. The proposed map exhibits good statistical...

    Ahmed Sahnoune, Elhadj Zeraoulia in Multimedia Tools and Applications
    Article 25 January 2024
  16. Biometric cryptosystems: a comprehensive survey

    Biometric Cryptosystem (BCS) combines characteristics of both the fields: biometric and cryptosystem, where biometric provides authentication and...

    Prabhjot Kaur, Nitin Kumar, Maheep Singh in Multimedia Tools and Applications
    Article 30 September 2022
  17. LowMS: a new rank metric code-based KEM without ideal structure

    Nicolas Aragon, Victor Dyseryn, ... Antonia Wachter-Zeh in Designs, Codes and Cryptography
    Article 07 December 2023
  18. A New Code-Based Cryptosystem

    Unlike most papers devoted to improvements of code-based cryptosystem, where original Goppa codes are substituted by some other codes, we suggest a...
    Fedor Ivanov, Grigory Kabatiansky, ... Nikita Rumenko in Code-Based Cryptography
    Conference paper 2020
  19. A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap \(2^k\) -Residuosity Assumption

    We present a novel public key encryption scheme that enables users to exchange many bits messages by means of at least two large prime numbers in a...
    Conference paper 2021
  20. Security enhanced privacy-preserving data aggregation scheme for intelligent transportation system

    The intelligent transportation system can make traffic decisions through the sensory data collected by vehicles to ensure driving safety, improve...

    Kaizhong Zuo, **xi Chu, ... Zhangyi Shen in The Journal of Supercomputing
    Article 12 March 2024
Did you find what you were looking for? Share feedback.