-
101
Decentralized identifiers based IoT data trusted collection
Published 2025-02-01Get full text
Article -
102
Pengamanan Citra Berwarna Menggunakan Kriptografi Visual Skema Meaningful Shares dan Steganografi LSB
Published 2022-12-01“…Abstract Information security is important so that files that are confidential can be protected from unauthorized persons, therefor there is Cryptography and Steganograph. Cryptography is used to encrypt files by changing it, while Steganography inserts the file without changing it.for image, there is the branch that can be used to secure it, namely Visual Cryptography secret sharing scheme. …”
Get full text
Article -
103
Pioneering the Security of EHRs Using an Immersive Blockchain Conceptual Framework
Published 2025-02-01“…Findings indicate that this hybrid blockchain model, enhanced with quantum-resistant cryptography and decentralized governance, significantly improves EHR security. …”
Get full text
Article -
104
A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices
Published 2011-01-01“…Public Key Cryptography enables entity authentication protocols based on a platform's knowledge of other platforms' public key. …”
Get full text
Article -
105
On the Search for Supersingular Elliptic Curves and Their Applications
Published 2025-01-01“…Elliptic curves with the special quality known as supersingularity have gained much popularity in the rapidly developing field of cryptography. The conventional method of employing random search is quite ineffective in finding these curves. …”
Get full text
Article -
106
PROBABILISTIC PROPERTIES OF THE INITIAL VALUES OF WEIGHTING FACTORS IN SYNCHRONIZED ARTIFICIAL NEURAL
Published 2015-05-01“…One of the most efficient ways for identical binary se quences generation is using methods of neural cryptography. The initial weight vestors values influence on speed of synchronization is analized. …”
Get full text
Article -
107
INNOVATIVE MECHANISMS FOR IMPLEMENTING STATE ECONOMIC POLICY FOR POST-WAR RECONSTRUCTION OF UKRAINE: QUANTUM TRANSFORMATIONS AS A DRIVER OF DEVELOPMENT
Published 2024-12-01“…The second quantum revolution involves the introduction of quantum computers, quantum cryptography and quantum communication, capable of accelerating the development of new materials, optimizing logistics chains and increasing the level of data security. …”
Get full text
Article -
108
Analysis of the Fault Attack ECDLP over Prime Field
Published 2011-01-01“…In 2000, Biehl et al. proposed a fault-based attack on elliptic curve cryptography. In this paper, we refined the fault attack method. …”
Get full text
Article -
109
The condition number associated with ideal lattices from odd prime degree cyclic number fields
Published 2025-02-01“…The condition number of a generator matrix of an ideal lattice derived from the ring of integers of an algebraic number field is an important quantity associated with the equivalence between two computational problems in lattice-based cryptography, the “Ring Learning With Errors (RLWE)” and the “Polynomial Learning With Errors (PLWE)”. …”
Get full text
Article -
110
Sieve Method for Polynomial Linear Equivalence
Published 2013-01-01“…We consider the polynomial linear equivalence (PLE) problem arising from the multivariate public key cryptography, which is defined as to find an invertible linear transformation ℒ satisfying 𝒫=𝒮∘ℒ for given nonlinear polynomial maps 𝒫 and 𝒮 over a finite field 𝔽q. …”
Get full text
Article -
111
Topological Indices of Total Graph and Zero Divisor Graph of Commutative Ring: A Polynomial Approach
Published 2023-01-01“…Graphs containing finite commutative rings have wide applications in robotics, information and communication theory, elliptic curve cryptography, physics, and statistics. In this article, the topological indices of the total graph Tℤnn∈ℤ+, the zero divisor graph Γℤrn (r is prime, n∈ℤ+), and the zero divisor graph Γℤr×ℤs×ℤt (r,s,t are primes) are computed using some algebraic polynomials.…”
Get full text
Article -
112
An Image Sharing Encryption Management System For Kabale University.
Published 2024“…Myriad methods of protection are used ranging from a simple authentication password to most complex cryptography or Steganography algorithms for hiding the extremely sensitive data. …”
Get full text
Thesis -
113
Pengamanan Citra Digital Menggunakan Kriptografi DnaDan Modified LSB
Published 2024-12-01“…Abstract Digital image encryption using DNA Cryptography combines computational science with biological principles to provide dual security. …”
Get full text
Article -
114
Breaking the Blockchain Trilemma: A Comprehensive Consensus Mechanism for Ensuring Security, Scalability, and Decentralization
Published 2024-01-01“…Employing established techniques such as elliptic curve cryptography, Schnorr verifiable random function, and zero-knowledge proof (zk-SNARK), alongside groundbreaking methodologies for stake distribution, anomaly detection, and incentive alignment, our framework sets a new benchmark for secure, scalable, and decentralized blockchain ecosystems. …”
Get full text
Article -
115
Lattice-based provable data possession in the standard model for cloud-based smart grid data management systems
Published 2022-04-01“…With the development of quantum computer technology, quantum attacks-resistant cryptographic schemes are gradually entering people’s horizons. Lattice cryptography can resist quantum attacks. In this article, a lattice-based provable data possession scheme is proposed for cloud-based smart grid data management systems. …”
Get full text
Article -
116
Revisiting Sum of Residues Modular Multiplication
Published 2010-01-01“…In the 1980s, when the introduction of public key cryptography spurred interest in modular multiplication, many implementations performed modular multiplication using a sum of residues. …”
Get full text
Article -
117
A new cryptosystem based on an enhanced Vigenere cipher incorporating large SBoxes
Published 2025-01-01“…This technique relies on a significant enhancement of the conventional Vigenere method, incorporating the implementation of two large substitution tables generated from the widely used chaotic maps in cryptography. The system integrates new confusion/diffusion functions, governed by binary decision vectors of pseudorandom values. …”
Get full text
Article -
118
Bit-Sliced Implementation of SM4 and New Performance Records
Published 2023-01-01“…SM4 is a popular block cipher issued by the Office of State Commercial Cryptography Administration (OSCCA) of China. In this paper, we use the bit-slicing technique that has been shown as a powerful strategy to achieve very fast software implementations of SM4. …”
Get full text
Article -
119
A Survey of Research Progress and Development Tendency of Attribute-Based Encryption
Published 2014-01-01“…With the development of cryptography, the attribute-based encryption (ABE) draws widespread attention of the researchers in recent years. …”
Get full text
Article -
120