-
1
-
2
Multistage Encryption for Text Using Steganography and Cryptography
Published 2023-03-01“…Finally, our research provides more security because of the mixture between cryptography and steganography. …”
Get full text
Article -
3
Hybrid Cryptography Based on Planets: Phobos & Deimos
Published 2025-01-01“…To address these issues, it is crucial to innovate in cryptography, the backbone of data security. This document presents the Phobos and Deimos encryption method, inspired by Mars’ moons. …”
Get full text
Article -
4
A Survey of Post-Quantum Cryptography Migration in Vehicles
Published 2025-01-01Subjects: “…Post-quantum cryptography (PQC)…”
Get full text
Article -
5
Electronic Voting Protocol Using Identity-Based Cryptography
Published 2015-01-01“…Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. …”
Get full text
Article -
6
A Privacy-Preserving Biometric Recognition System with Visual Cryptography
Published 2022-01-01“…Visual cryptography combines perfect ciphers and secret sharing in cryptography with images, thus eliminating the complex operations in existing privacy-preserving schemes based on cryptography or watermarking. …”
Get full text
Article -
7
A Survey of Efficient Lightweight Cryptography for Power-Constrained Microcontrollers
Published 2024-12-01“…This review paper assesses the implementation of lightweight cryptographic algorithms for power-constrained microcontrollers in IoT systems using symmetric cryptography. The implemented algorithms analyze the resource constraints of the IoT devices and compare their performance for the efficient implementation of secure monitoring systems. …”
Get full text
Article -
8
Recent progress in the security evaluation of multivariate public‐key cryptography
Published 2023-03-01“…Abstract Multivariate public‐key cryptography (MPKC) is considered a leading candidate for post‐quantum cryptography (PQC). …”
Get full text
Article -
9
An efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms
Published 2022-04-01“…This article proposes an efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms, which includes an encryption and a decryption schemes for gray-scale and color secret images. …”
Get full text
Article -
10
Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography
Published 2023-03-01Get full text
Article -
11
Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services
Published 2024-01-01Get full text
Article -
12
Breaking barriers in two-party quantum cryptography via stochastic semidefinite programming
Published 2025-01-01Get full text
Article -
13
Elliptic-Curve Cryptography Implementation on RISC-V Processors for Internet of Things Applications
Published 2024-01-01“…Elliptic-curve cryptography (ECC) is a popular technique of public-key cryptography used for secure communications in Internet of Things (IoT) applications. …”
Get full text
Article -
14
Perspectives on Entangled Nuclear Particle Pairs Generation and Manipulation in Quantum Communication and Cryptography Systems
Published 2012-01-01“…Entanglement between two quantum elements is a phenomenon which presents a broad application spectrum, being used largely in quantum cryptography schemes and in physical characterisation of the universe. …”
Get full text
Article -
15
Comment on ‘Targeted Ciphers for Format‐Preserving Encryption’ from Selected Areas in Cryptography 2018
Published 2021-09-01Subjects: “…cryptography…”
Get full text
Article -
16
Enhancing the Process of AES: A Lightweight Cryptography Algorithm AES for Ad-hoc Environments
Published 2022-12-01Subjects: Get full text
Article -
17
A high speed processor for elliptic curve cryptography over NIST prime field
Published 2022-07-01Subjects: “…cryptography…”
Get full text
Article -
18
A Survey of Secure Communications for Satellite Internet Based on Cryptography and Physical Layer Security
Published 2023-01-01“…Based on different security mechanisms, we first categorize the existing works of secure communications in satellite internet into two categories: cryptography-based and physical layer security-based. …”
Get full text
Article -
19
-
20
Revocable identity‐based matchmaking encryption in the standard model
Published 2023-07-01Subjects: “…cryptography…”
Get full text
Article