Showing 1 - 20 results of 176 for search '"Cryptography"', query time: 0.05s Refine Results
  1. 1

    Public-Key cryptography / by Salomaa, Arto

    Published 2010
    Subjects:
    View in OPAC
    Book
  2. 2

    Multistage Encryption for Text Using Steganography and Cryptography by Mohammed Majid Msallam, Fayez Aldoghan

    Published 2023-03-01
    “…Finally, our research provides more security because of the mixture between cryptography and steganography. …”
    Get full text
    Article
  3. 3

    Hybrid Cryptography Based on Planets: Phobos & Deimos by Kraicha Ayoub, Touil Hamza, El Akkad Nabil

    Published 2025-01-01
    “…To address these issues, it is crucial to innovate in cryptography, the backbone of data security. This document presents the Phobos and Deimos encryption method, inspired by Mars’ moons. …”
    Get full text
    Article
  4. 4

    A Survey of Post-Quantum Cryptography Migration in Vehicles by Nils Lohmiller, Sabrina Kaniewski, Michael Menth, Tobias Heer

    Published 2025-01-01
    Subjects: “…Post-quantum cryptography (PQC)…”
    Get full text
    Article
  5. 5

    Electronic Voting Protocol Using Identity-Based Cryptography by Gina Gallegos-Garcia, Horacio Tapia-Recillas

    Published 2015-01-01
    “…Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. …”
    Get full text
    Article
  6. 6

    A Privacy-Preserving Biometric Recognition System with Visual Cryptography by Lijing Ren, Denghui Zhang

    Published 2022-01-01
    “…Visual cryptography combines perfect ciphers and secret sharing in cryptography with images, thus eliminating the complex operations in existing privacy-preserving schemes based on cryptography or watermarking. …”
    Get full text
    Article
  7. 7

    A Survey of Efficient Lightweight Cryptography for Power-Constrained Microcontrollers by Jesús Soto-Cruz, Erica Ruiz-Ibarra, Javier Vázquez-Castillo, Adolfo Espinoza-Ruiz, Alejandro Castillo-Atoche, Joaquin Mass-Sanchez

    Published 2024-12-01
    “…This review paper assesses the implementation of lightweight cryptographic algorithms for power-constrained microcontrollers in IoT systems using symmetric cryptography. The implemented algorithms analyze the resource constraints of the IoT devices and compare their performance for the efficient implementation of secure monitoring systems. …”
    Get full text
    Article
  8. 8

    Recent progress in the security evaluation of multivariate public‐key cryptography by Yasuhiko Ikematsu, Shuhei Nakamura, Tsuyoshi Takagi

    Published 2023-03-01
    “…Abstract Multivariate public‐key cryptography (MPKC) is considered a leading candidate for post‐quantum cryptography (PQC). …”
    Get full text
    Article
  9. 9

    An efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms by Huan Wang, Zhongyuan Jiang, Qing Qian, Hong Wang

    Published 2022-04-01
    “…This article proposes an efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms, which includes an encryption and a decryption schemes for gray-scale and color secret images. …”
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13

    Elliptic-Curve Cryptography Implementation on RISC-V Processors for Internet of Things Applications by Preethi Preethi, Mohammed Mujeer Ulla, G. Praveen Kumar Yadav, Kumar Sekhar Roy, Ruhul Amin Hazarika, Kuldeep Saxena K.

    Published 2024-01-01
    “…Elliptic-curve cryptography (ECC) is a popular technique of public-key cryptography used for secure communications in Internet of Things (IoT) applications. …”
    Get full text
    Article
  14. 14

    Perspectives on Entangled Nuclear Particle Pairs Generation and Manipulation in Quantum Communication and Cryptography Systems by Octavian Dănilă, Paul E. Sterian, Andreea Rodica Sterian

    Published 2012-01-01
    “…Entanglement between two quantum elements is a phenomenon which presents a broad application spectrum, being used largely in quantum cryptography schemes and in physical characterisation of the universe. …”
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18

    A Survey of Secure Communications for Satellite Internet Based on Cryptography and Physical Layer Security by Yu Zhang, Shuangrui Zhao, Ji He, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang

    Published 2023-01-01
    “…Based on different security mechanisms, we first categorize the existing works of secure communications in satellite internet into two categories: cryptography-based and physical layer security-based. …”
    Get full text
    Article
  19. 19
  20. 20