Search
Search Results
-
A DNA Cryptosystem Using Diffie–Hellman Key Exchange
DNA cryptography is a method of concealing information in the form of DNA sequence. It is growing in popularity as a result of its quicker...
-
Paillier cryptosystem enhancement for Homomorphic Encryption technique
Homomorphic Encryption (HE) is one of the most popular technologies which assists for kee** the confidentiality and privacy of user data on cloud...
-
Real time region of interest based chaotic image cryptosystem for IoT applications
Recently, internet of things (IoT) is extensively used in wide applications like industry, e-healthcare, agriculture to send images through internet...
-
Lightweight and authentic symmetric session key cryptosystem for client–server mobile communication
Over the last decade, millions of 4G and 5G-enabled mobile devices have become part of the Internet. Almost, all the applications have been shifted...
-
Applicable image cryptosystem using bit-level permutation, particle swarm optimisation, and quantum walks
Digital data plays a paramount part in various fields of life, in which multimedia data represent the majority of transferred digital data via...
-
New image encryption algorithm based on hyperchaotic 3D-IHAL and a hybrid cryptosystem
The performance of chaotic systems in generating signals is an essential factor in determining the security of cryptosystems. A new 3D chaotic system...
-
Medical image cryptosystem using a new 3-D map implemented in a microcontroller
Medical images make up for more than 25% of global attacks on privacy. Securing them is therefore of utmost importance. Chaos based image encryption...
-
Two modifications for Loidreau’s code-based cryptosystem
This paper presents two modifications for Loidreau’s cryptosystem, a rank metric-based cryptosystem constructed by using Gabidulin codes in the...
-
Skew differential Goppa codes and their application to Mceliece cryptosystem
A class of linear codes that extends classical Goppa codes to a non-commutative context is defined. An efficient decoding algorithm, based on the...
-
SIFTBCS: scale invariant feature transform based fuzzy vault scheme in biometric cryptosystem
Biometric cryptosystem (BCS) is a challenging field of study where data is secured using biometrics features and cryptographic encryption. The...
-
CryptoHHO: a bio-inspired cryptosystem for data security in Fog–Cloud architecture
The exponential growth of Internet-of-Things (IoT) has raised several data security risks to the Fog–Cloud architecture. The performance and the...
-
Hybrid cryptosystem based healthcare data sharing with access control policy in cloud environment
Healthcare cloud computing environments are expanding quickly, and security and confidentiality of patient records are top priorities. Academics and...
-
Mixed-multiple image encryption algorithm using RSA cryptosystem with fractional discrete cosine transform and 2D-Arnold Transform
This paper presents a novel multiple-image encryption (MIE) technique based on mixed image elements associated with RSA cryptosystem, fractional...
-
SURFBCS: speeded up robust features based fuzzy vault scheme in biometric cryptosystem
Biometric cryptosystem (BCS) is an emerging research area in which Biometric alleviates the need to remember passwords and cryptography provides a...
-
Asymmetric Cryptosystem Based on Biological Mutation Operation in Chirp-Z Domain
In this paper, we have proposed an asymmetric image encryption algorithm in the Chirp-Z domain using chaotic Tinkerbell map, DNA coding with...
-
Robust medical and color image cryptosystem using array index and chaotic S-box
Providing robust security within an image cryptosystem during network communication is more essential than ever, highlighting the fundamental aspects...
-
Design and implementation of a new lightweight chaos-based cryptosystem to secure IoT communications
Internet of things (IoT) provides several applications such as intelligent urban transportation, smart factory, and smart health. In such systems,...
-
A novel multi-layer color image encryption based on RSA cryptosystem, RP2DFrHT and generalized 2D Arnold map
The biggest threat to information security is the irrelevant presence of eavesdroppers, unauthorized access, illegal acquisition and modification...
-
Image cryptosystem based on modified Henon chaotic map and dynamic encoding mechanism
In this article, a novel cryptosystem for the protection of images is proposed. The proposed cryptosystem uses two dimensional modified Henon map...
-
Robust Rabin Cryptosystem Biometric Privacy Preserving Authentication Technique for IoT Enabled Devices Over Cloud
With the advent of growing technologies and digitalization, smart factories and healthcare systems in the cloud are more focused towards task-driven...