Conic curve encryption and digital signature based on complex number theory for cybersecurity applications
Abstract Secure image transmission requires robust algorithms to ensure authentication, integrity, non-repudiation, and confidentiality. Addressing emerging security challenges necessitates continuous advancements in cryptographic design. This paper presents an authenticated and encrypted image sche...
Saved in:
| Main Authors: | Ahmed Kamal, H. A. El-Kamchochi, Adel El-Fahar, Esam A. A. Hagras |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Nature Portfolio
2025-07-01
|
| Series: | Scientific Reports |
| Subjects: | |
| Online Access: | https://doi.org/10.1038/s41598-025-00334-6 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Dynamics Data Encryption Based on Chaotic Functions and Elliptic Curves: Application to Text Data
by: Joel Kinganga, et al.
Published: (2025-03-01) -
Automated Correctness Proof of Algorithm Variants in Elliptic Curve Cryptography
by: M. . Anikeev, et al.
Published: (2010-12-01) -
Efficient traceable identity-based signature scheme
by: DU Hong-zhen1, et al.
Published: (2009-01-01) -
Efficient certificateless multi-receiver anonymous signcryption scheme
by: Yan-lin QIN, et al.
Published: (2016-06-01) -
The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field
by: Ijaz Khalid, et al.
Published: (2022-01-01)