Showing 101 - 120 results of 176 for search '"Cryptography"', query time: 0.05s Refine Results
  1. 101
  2. 102

    Pengamanan Citra Berwarna Menggunakan Kriptografi Visual Skema Meaningful Shares dan Steganografi LSB by Fariz Abid Darmawan, Ari Kusyanti, Rakhmadhanny Primananda

    Published 2022-12-01
    “…Abstract Information security is important so that files that are confidential can be protected from unauthorized persons, therefor there is Cryptography and Steganograph. Cryptography is used to encrypt files by changing it, while Steganography inserts the file without changing it.for image, there is the branch that can be used to secure it, namely Visual Cryptography secret sharing scheme. …”
    Get full text
    Article
  3. 103

    Pioneering the Security of EHRs Using an Immersive Blockchain Conceptual Framework by Rihab Benaich, Youssef Gahi, Saida El Mendili

    Published 2025-02-01
    “…Findings indicate that this hybrid blockchain model, enhanced with quantum-resistant cryptography and decentralized governance, significantly improves EHR security. …”
    Get full text
    Article
  4. 104

    A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices by Alexander Klimm, Benjamin Glas, Matthias Wachs, Sebastian Vogel, Klaus D. Müller-Glaser, Jürgen Becker

    Published 2011-01-01
    “…Public Key Cryptography enables entity authentication protocols based on a platform's knowledge of other platforms' public key. …”
    Get full text
    Article
  5. 105

    On the Search for Supersingular Elliptic Curves and Their Applications by Ismel Martinez-Diaz, Rashad Ali, Muhammad Kamran Jamil

    Published 2025-01-01
    “…Elliptic curves with the special quality known as supersingularity have gained much popularity in the rapidly developing field of cryptography. The conventional method of employing random search is quite ineffective in finding these curves. …”
    Get full text
    Article
  6. 106

    PROBABILISTIC PROPERTIES OF THE INITIAL VALUES OF WEIGHTING FACTORS IN SYNCHRONIZED ARTIFICIAL NEURAL by V. F. Golikov, N. V. Brich

    Published 2015-05-01
    “…One of the most efficient ways for identical binary se quences generation is using methods of neural cryptography. The initial weight vestors values influence on speed of synchronization is analized. …”
    Get full text
    Article
  7. 107

    INNOVATIVE MECHANISMS FOR IMPLEMENTING STATE ECONOMIC POLICY FOR POST-WAR RECONSTRUCTION OF UKRAINE: QUANTUM TRANSFORMATIONS AS A DRIVER OF DEVELOPMENT by Oleksiy Shkuratov, Liudmila Antonova, Roman Dzyuba

    Published 2024-12-01
    “…The second quantum revolution involves the introduction of quantum computers, quantum cryptography and quantum communication, capable of accelerating the development of new materials, optimizing logistics chains and increasing the level of data security. …”
    Get full text
    Article
  8. 108

    Analysis of the Fault Attack ECDLP over Prime Field by Mingqiang Wang, Tao Zhan

    Published 2011-01-01
    “…In 2000, Biehl et al. proposed a fault-based attack on elliptic curve cryptography. In this paper, we refined the fault attack method. …”
    Get full text
    Article
  9. 109

    The condition number associated with ideal lattices from odd prime degree cyclic number fields by de Araujo Robson Ricardo

    Published 2025-02-01
    “…The condition number of a generator matrix of an ideal lattice derived from the ring of integers of an algebraic number field is an important quantity associated with the equivalence between two computational problems in lattice-based cryptography, the “Ring Learning With Errors (RLWE)” and the “Polynomial Learning With Errors (PLWE)”. …”
    Get full text
    Article
  10. 110

    Sieve Method for Polynomial Linear Equivalence by Baocang Wang, Yupu Hu

    Published 2013-01-01
    “…We consider the polynomial linear equivalence (PLE) problem arising from the multivariate public key cryptography, which is defined as to find an invertible linear transformation ℒ satisfying 𝒫=𝒮∘ℒ for given nonlinear polynomial maps 𝒫 and 𝒮 over a finite field 𝔽q. …”
    Get full text
    Article
  11. 111

    Topological Indices of Total Graph and Zero Divisor Graph of Commutative Ring: A Polynomial Approach by Sourav Mondal, Muhammad Imran, Nilanjan De, Anita Pal

    Published 2023-01-01
    “…Graphs containing finite commutative rings have wide applications in robotics, information and communication theory, elliptic curve cryptography, physics, and statistics. In this article, the topological indices of the total graph Tℤnn∈ℤ+, the zero divisor graph Γℤrn (r is prime, n∈ℤ+), and the zero divisor graph Γℤr×ℤs×ℤt (r,s,t are primes) are computed using some algebraic polynomials.…”
    Get full text
    Article
  12. 112

    An Image Sharing Encryption Management System For Kabale University. by Bemera, Rauben

    Published 2024
    “…Myriad methods of protection are used ranging from a simple authentication password to most complex cryptography or Steganography algorithms for hiding the extremely sensitive data. …”
    Get full text
    Thesis
  13. 113

    Pengamanan Citra Digital Menggunakan Kriptografi DnaDan Modified LSB by Sabrina Adela Br Sibarani, Andreas Munthe, Ronsen Purba, Ali Akbar Lubis

    Published 2024-12-01
    “…Abstract Digital image encryption using DNA Cryptography combines computational science with biological principles to provide dual security. …”
    Get full text
    Article
  14. 114

    Breaking the Blockchain Trilemma: A Comprehensive Consensus Mechanism for Ensuring Security, Scalability, and Decentralization by Khandakar Md Shafin, Saha Reno

    Published 2024-01-01
    “…Employing established techniques such as elliptic curve cryptography, Schnorr verifiable random function, and zero-knowledge proof (zk-SNARK), alongside groundbreaking methodologies for stake distribution, anomaly detection, and incentive alignment, our framework sets a new benchmark for secure, scalable, and decentralized blockchain ecosystems. …”
    Get full text
    Article
  15. 115

    Lattice-based provable data possession in the standard model for cloud-based smart grid data management systems by Caixue Zhou, Lihua Wang, Lingmin Wang

    Published 2022-04-01
    “…With the development of quantum computer technology, quantum attacks-resistant cryptographic schemes are gradually entering people’s horizons. Lattice cryptography can resist quantum attacks. In this article, a lattice-based provable data possession scheme is proposed for cloud-based smart grid data management systems. …”
    Get full text
    Article
  16. 116

    Revisiting Sum of Residues Modular Multiplication by Yinan Kong, Braden Phillips

    Published 2010-01-01
    “…In the 1980s, when the introduction of public key cryptography spurred interest in modular multiplication, many implementations performed modular multiplication using a sum of residues. …”
    Get full text
    Article
  17. 117

    A new cryptosystem based on an enhanced Vigenere cipher incorporating large SBoxes by Chemlal Abdelhakim, Tabti Hassan, El Bourakkadi Hamid, Abid Abdellah, Jarjar Abdellatif, Benazzi Abdelhamid

    Published 2025-01-01
    “…This technique relies on a significant enhancement of the conventional Vigenere method, incorporating the implementation of two large substitution tables generated from the widely used chaotic maps in cryptography. The system integrates new confusion/diffusion functions, governed by binary decision vectors of pseudorandom values. …”
    Get full text
    Article
  18. 118

    Bit-Sliced Implementation of SM4 and New Performance Records by Xin Miao, Lu Li, Chun Guo, Meiqin Wang, Weijia Wang

    Published 2023-01-01
    “…SM4 is a popular block cipher issued by the Office of State Commercial Cryptography Administration (OSCCA) of China. In this paper, we use the bit-slicing technique that has been shown as a powerful strategy to achieve very fast software implementations of SM4. …”
    Get full text
    Article
  19. 119

    A Survey of Research Progress and Development Tendency of Attribute-Based Encryption by Liaojun Pang, Jie Yang, Zhengtao Jiang

    Published 2014-01-01
    “…With the development of cryptography, the attribute-based encryption (ABE) draws widespread attention of the researchers in recent years. …”
    Get full text
    Article
  20. 120