We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 9,618 results
  1. Multi-Party Threshold Cryptography

    In a threshold cryptosystem, the private key is typically distributed among parties that constitute the system using cryptographically secure secret...
    Chapter Open access 2023
  2. A fake threshold visual cryptography of QR code

    Visual cryptography (VC) is a technique that can encrypt images without complicated calculation. As the image, the quick response (QR) code can also...

    Tao Liu, Bin Yan, ... Jeng-Shyang Pan in Multimedia Tools and Applications
    Article 30 April 2022
  3. Exploring recent advances in random grid visual cryptography algorithms

    Visual cryptography scheme is initiated to securely encode a secret image into multiple shares. The secret can be reconstructed by overlaying the...

    Neetha Francis, A. Lisha, Thomas Monoth in The Journal of Supercomputing
    Article 10 July 2024
  4. Security enhancement of an (n, n) threshold non-expansible XOR-based visual cryptography with unique meaningful shares

    More and more visual cryptography (VC) schemes have been engaged by introducing computational operations, such as XOR, in the secret decoding phase....

    **-Wen Wu, Tzung-Her Chen in Multimedia Tools and Applications
    Article 08 September 2023
  5. Implementing Post-quantum Cryptography for Developers

    Widely used public key cryptography is threatened by the development of quantum computers. Post-quantum algorithms have been designed for the purpose...

    Julius Hekkala, Mari Muurman, ... Visa Vallivaara in SN Computer Science
    Article Open access 29 April 2023
  6. Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography

    Distributed oblivious polynomial evaluation (DOPE) is a variant of two-party computation where a sender party...
    Amirreza Hamidi, Hossein Ghodosi in Information and Communications Security
    Conference paper 2023
  7. Security enhanced random grid visual cryptography scheme using master share and embedding method

    Visual cryptography scheme is one of the main branches of secret sharing. The image is converted into various shares and then recouped by overlap**...

    Neetha Francis, Thomas Monoth in International Journal of Information Technology
    Article 17 August 2023
  8. Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis

    In today's interconnected world, safeguarding digital data's confidentiality and security is crucial. Cryptography and steganography are two primary...

    Indy Haverkamp, Dipti K. Sarmah in International Journal of Information Security
    Article Open access 05 May 2024
  9. Quantum-safe cryptography: crossroads of coding theory and cryptography

    We present an overview of quantum-safe cryptography (QSC) with a focus on post-quantum cryptography (PQC) and information-theoretic security. From a...

    Jiabo Wang, Ling Liu, ... Cong Ling in Science China Information Sciences
    Article Open access 21 December 2021
  10. Approach for Protecting Mobile Device User’s Data Based on Multifactor Authentication, Visual Cryptography, and Steganography

    Abstract

    An approach is proposed to protect user’s personal data stored on mobile devices running the Android OS, which combines multifactor...

    Article 01 December 2023
  11. Use of cryptography in malware obfuscation

    Malware authors often use cryptographic tools such as XOR encryption and block ciphers like AES to obfuscate part of the malware to evade detection....

    Hassan Jameel Asghar, Benjamin Zi Hao Zhao, ... Daniel Coscia in Journal of Computer Virology and Hacking Techniques
    Article 25 September 2023
  12. Modified lightweight cryptography scheme and its applications in IoT environment

    Interconnected devices have been with us for a long time. The security of the data exchanged through these devices is a matter of grave concern....

    Nilufar Yasmin, Richa Gupta in International Journal of Information Technology
    Article 26 September 2023
  13. Identity-Based Threshold Signatures from Isogenies

    The identity-based signature, initially introduced by Shamir [26], plays a fundamental role in the domain of identity-based cryptography. It offers...
    Shahla Atapoor in Cryptography and Coding
    Conference paper 2024
  14. XVC scheme-based secret sharing model with hybrid optimization algorithm for visual cryptography

    Visual cryptography (VC) is a model that permits visual data in an encrypted manner in such a way that decrypted data occurs in the form of visual...

    Manoj Kumar, Shashi Shekhar in Signal, Image and Video Processing
    Article 05 May 2024
  15. Contrast-enhanced visual cryptography schemes based on block pixel patterns

    Block-wise visual cryptography scheme is size invariant and it provides perfect security. It eliminates pixel expansion and security problems but it...

    Article 18 May 2023
  16. Cryptography

    This chapter will cover cryptography and its two main types, symmetric cryptography and public key cryptography. After exploring some fundamental...
    Imran Bashir in Blockchain Consensus
    Chapter 2022
  17. TVES: Threshold Verifiably Encrypted Signature and Its Applications

    Verifiably Encrypted Signature (VES) is useful to enable fair exchange in online contract signing. This cryptographic primitive introduces the...
    Chen Li, Haibo Tian, Fangguo Zhang in Information Security and Cryptology
    Conference paper 2024
  18. Efficient multimodal cancelable biometric system based on steganography and cryptography

    Due to the development of hacking programs, it has become easy to penetrate systems. Hence, there is a need for strong security mechanisms. The use...

    Gerges M. Salama, Safaa El-Gazar, ... Fathi E. Abd El-Samie in Iran Journal of Computer Science
    Article 03 December 2022
  19. Secure video steganographic model using framelet transform and elliptic curve cryptography

    Information security holds a quintessential role in the era of digital communication. Nowadays, social media has become the new platform to share a...

    Sonali Rout, Ramesh Kumar Mohapatra in Multimedia Tools and Applications
    Article 28 August 2023
  20. Cutting the GRASS: Threshold GRoup Action Signature Schemes

    Group actions are fundamental mathematical tools, with a long history of use in cryptography. Indeed, the action of finite groups at the basis of the...
    Michele Battagliola, Giacomo Borin, ... Edoardo Persichetti in Topics in Cryptology – CT-RSA 2024
    Conference paper 2024
Did you find what you were looking for? Share feedback.