-
1
Cryptographic Censorship
Published 2025-01-01“…Abstract We formulate and take two large strides towards proving a quantum version of the weak cosmic censorship conjecture. We first prove “Cryptographic Censorship”: a theorem showing that when the time evolution operator of a holographic CFT is approximately pseudorandom (or Haar random) on some code subspace, then there must be an event horizon in the corresponding bulk dual. …”
Get full text
Article -
2
Biometric Fusion for Enhanced Authentication in Cloud Computing Environments
Published 2024-03-01Subjects: Get full text
Article -
3
Keamanan Data Menggunakan Secure Hashing Algorithm (SHA)-256 dan Rivest Shamir Adleman (RSA) pada Digital Signature
Published 2023-12-01“…It is the most popular cryptographic system used to provide digital signatures, secrecy and keys. …”
Get full text
Article -
4
Implementasi Algoritma AES 256 CBC, BASE 64, Dan SHA 256 dalam Pengamanan dan Validasi Data Ujian Online
Published 2023-10-01“…One solution for maintaining the integrity of online-based exam results is to encrypt exam data with cryptographic methods. This study proposes applying several cryptographic methods to secure and ensure the authenticity of online exam data using AES 256 CBC, Base 64, and SHA 256 algorithms. …”
Get full text
Article -
5
Pengamanan Pesan E-Complaint Fasilitas dan Kinerja Civitas Akademika Menggunakan Algoritma RSA
Published 2022-12-01“…The choice of RSA as a cryptographic algorithm is due to the difficulty of factoring prime numbers in key generation. …”
Get full text
Article -
6
Implementation of Simplified Data Encryption Standard on FPGA using VHDL
Published 2022-03-01“…The DES is replaced by a number of new cryptographical methods, which based on DES, like AES and 3DES. …”
Get full text
Article -
7
Pioneering the Security of EHRs Using an Immersive Blockchain Conceptual Framework
Published 2025-02-01“…Methods/Analysis involve a novel combination of Advanced Encryption Standard (AES) and quantum cryptographic algorithms CRYSTALS-Dilithium and CRYSTALS-Kyber within a hybrid blockchain architecture to secure EHRs. …”
Get full text
Article -
8
An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3)
Published 2024-12-01“…However, it cannot withstand the advancements in technology that can break cryptographic methods. Therefore, combining cryptography and steganography is always advisable because steganography increases the security of the carrier message as encryption (Cryptography) provides confidentiality. …”
Get full text
Article -
9
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
Published 2024-03-01“…The results and discussions described include, among others, Pseudocode, Cryptographic Testing, and Steganography Testing. Based on the results of program analysis and testing, it can be concluded that the more messages that are inserted in the image, the more pixel differences there are in the stego image. …”
Get full text
Article -
10
An improved Fully Homomorphic Encryption model based on N-Primes
Published 2019-10-01“…Therefore, the traditional cryptographic schemes cannot be used to process cloud’s data. …”
Get full text
Article -
11
Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption
Published 2024-05-01“…This study delves into the prevalent cryptographic methods and algorithms utilized for prevention and stream encryption, examining their encoding techniques such as advanced encryption standard (AES), Blowfish, Twofish, Salsa20, and ChaCha20. …”
Get full text
Article -
12
Cayley–Purser secured communication and jackknife correlative classification for COVID patient data analysis
Published 2025-02-01“…In order to solve these issues, Cayley–Purser Cryptographic Secured Communication based Jackknife Correlative Data Classification (CPCSC-JCDC) method is designed. …”
Get full text
Article -
13
Securing fog computing in healthcare with a zero-trust approach and blockchain
Published 2025-02-01“…The integration of BC and SDN supports continuous authentication and monitoring using cryptographic protocols (SHA-256A and RSA-2048) to secure data transmission. …”
Get full text
Article -
14
Analisis Pengaruh Citra Terhadap Kombinasi Kriptografi RSA dan STEGANOGRAFi LSB
Published 2022-02-01“…In this study, the technique is Rivest Shamir Adleman (RSA) Cryptographic algorithm and the Least Significant Bit (LSB) Steganography algorithm for message security. …”
Get full text
Article