Zobrazeno 1 - 10
of 57 822
pro vyhledávání: '"Encryption scheme"'
In this work, a new 4-D hyperchaotic system for image encryption is proposed and its effectiveness is demonstrated by incorporating it into an existing Elliptic Curve Cryptography (ECC) mapping scheme. The proposed system is considered simple because
Externí odkaz:
http://arxiv.org/abs/2411.17643
In this paper, we propose a novel construction for a symmetric encryption scheme, referred as SEBQ which is based on the structure of quasigroup. We utilize concepts of chaining like mode of operation and present a block cipher with in-built properti
Externí odkaz:
http://arxiv.org/abs/2408.04490
Autor:
Sun, Mingliang1 (AUTHOR) sunml2018@bupt.edu.cn, Yuan, Jie1 (AUTHOR) yuanjie@bupt.edu.cn, Li, Xiaoyong1 (AUTHOR), Liu, Dongxiao1 (AUTHOR), Wei, Xinghai1 (AUTHOR)
Publikováno v:
Entropy. Dec2024, Vol. 26 Issue 12, p1013. 29p.
Autor:
Kane, Seyni, Bkakria, Anis
Graph encryption schemes play a crucial role in facilitating secure queries on encrypted graphs hosted on untrusted servers. With applications spanning navigation systems, network topology, and social networks, the need to safeguard sensitive data be
Externí odkaz:
http://arxiv.org/abs/2405.19259
The McEliece scheme is a generic frame which allows to use any error correcting code of which there exists an efficient decoding algorithm to design an encryption scheme by hiding the generator matrix code. Similarly, the Niederreiter frame is the du
Externí odkaz:
http://arxiv.org/abs/2405.16539
Autor:
Rajan, Arun Amaithi, V, Vetriselvi
Publikováno v:
2024
In the age of digital technology, medical images play a crucial role in the healthcare industry which aids surgeons in making precise decisions and reducing the diagnosis time. However, the storage of large amounts of these images in third-party clou
Externí odkaz:
http://arxiv.org/abs/2405.09191
Publikováno v:
Application Research of Computers / Jisuanji Yingyong Yanjiu. Dec2024, Vol. 41 Issue 12, p3553-3562. 10p.
Autor:
Guo, Chong1 (AUTHOR) chongguo@emails.bjut.edu.cn, Gong, Bei1 (AUTHOR) gongbei@bjut.edu.cn, Waqas, Muhammad2,3 (AUTHOR) engr.waqas2079@gmail.com, Alasmary, Hisham4 (AUTHOR) alasmary@kku.edu.sa, Tu, Shanshan1 (AUTHOR) sstu@bjut.edu.cn, Chen, Sheng5 (AUTHOR) sqc@ecs.soton.ac.uk
Publikováno v:
Sensors (14248220). Nov2024, Vol. 24 Issue 21, p6843. 20p.
Autor:
Amirkhanova, Dana Sairangazhykyzy1 (AUTHOR) amirkhanovadana2@gmail.com, Iavich, Maksim2 (AUTHOR) miavich@cu.edu.ge, Mamyrbayev, Orken3 (AUTHOR) morkenj@mail.ru
Publikováno v:
Cryptography (2410-387X). Sep2024, Vol. 8 Issue 3, p31. 15p.
Autor:
Tuyéras, Rémy
This paper redefines the foundations of asymmetric cryptography's homomorphic cryptosystems through the application of the Yoneda Lemma. It explicitly illustrates that widely adopted systems, including ElGamal, RSA, Benaloh, Regev's LWE, and NTRUEncr
Externí odkaz:
http://arxiv.org/abs/2401.13255