Showing 1 - 14 results of 14 for search '"cryptographer"', query time: 0.04s Refine Results
  1. 1

    Cryptographic Censorship by Netta Engelhardt, Åsmund Folkestad, Adam Levine, Evita Verheijden, Lisa Yang

    Published 2025-01-01
    “…Abstract We formulate and take two large strides towards proving a quantum version of the weak cosmic censorship conjecture. We first prove “Cryptographic Censorship”: a theorem showing that when the time evolution operator of a holographic CFT is approximately pseudorandom (or Haar random) on some code subspace, then there must be an event horizon in the corresponding bulk dual. …”
    Get full text
    Article
  2. 2
  3. 3

    Keamanan Data Menggunakan Secure Hashing Algorithm (SHA)-256 dan Rivest Shamir Adleman (RSA) pada Digital Signature by Juniar Hutagalung, Puji Sari Ramadhan, Sarah Juliana Sihombing

    Published 2023-12-01
    “…It is the most popular cryptographic system used to provide digital signatures, secrecy and keys. …”
    Get full text
    Article
  4. 4

    Implementasi Algoritma AES 256 CBC, BASE 64, Dan SHA 256 dalam Pengamanan dan Validasi Data Ujian Online by Ferzha Putra Utama, Gusman Wijaya, Ruvita Faurina, Arie Vatresia

    Published 2023-10-01
    “…One solution for maintaining the integrity of online-based exam results is to encrypt exam data with cryptographic methods. This study proposes applying several cryptographic methods to secure and ensure the authenticity of online exam data using AES 256 CBC, Base 64, and SHA 256 algorithms. …”
    Get full text
    Article
  5. 5

    Pengamanan Pesan E-Complaint Fasilitas dan Kinerja Civitas Akademika Menggunakan Algoritma RSA by Dwi Yuny Sylfania, Fransiskus Panca Juniawan, Laurentinus Laurentinus, Hengki Hengki

    Published 2022-12-01
    “…The choice of RSA as a cryptographic algorithm is due to the difficulty of factoring prime numbers in key generation. …”
    Get full text
    Article
  6. 6

    Implementation of Simplified Data Encryption Standard on FPGA using VHDL by salim Qadir Mohammed

    Published 2022-03-01
    “…The DES is replaced by a number of new cryptographical methods, which based on DES, like AES and 3DES. …”
    Get full text
    Article
  7. 7

    Pioneering the Security of EHRs Using an Immersive Blockchain Conceptual Framework by Rihab Benaich, Youssef Gahi, Saida El Mendili

    Published 2025-02-01
    “…Methods/Analysis involve a novel combination of Advanced Encryption Standard (AES) and quantum cryptographic algorithms CRYSTALS-Dilithium and CRYSTALS-Kyber within a hybrid blockchain architecture to secure EHRs. …”
    Get full text
    Article
  8. 8

    An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3) by Kisakye Diana Michelle, Ocen Gilbert Gilibrays, Odongtoo Godfrey

    Published 2024-12-01
    “…However, it cannot withstand the advancements in technology that can break cryptographic methods. Therefore, combining cryptography and steganography is always advisable because steganography increases the security of the carrier message as encryption (Cryptography) provides confidentiality. …”
    Get full text
    Article
  9. 9

    The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key by Ilham Firman Ashari, Eko Dwi Nugroho, Dodi Devrian Andrianto, M. Asyroful Nur Maulana Yusuf, Makruf Alkarkhi

    Published 2024-03-01
    “…The results and discussions described include, among others, Pseudocode, Cryptographic Testing, and Steganography Testing. Based on the results of program analysis and testing, it can be concluded that the more messages that are inserted in the image, the more pixel differences there are in the stego image. …”
    Get full text
    Article
  10. 10

    An improved Fully Homomorphic Encryption model based on N-Primes by Mohammed Anwar Mohammed, Fadhil Salman Abed

    Published 2019-10-01
    “…Therefore, the traditional cryptographic schemes cannot be used to process cloud’s data. …”
    Get full text
    Article
  11. 11

    Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption by Rebwar Khalid Muhammed, Ribwar Rashid Aziz, Alla Ahmad Hassan, Aso Mohammed Aladdin, Shaida Jumaah Saydah, Tarik Ahmed Rashid, Bryar Ahmad Hassan

    Published 2024-05-01
    “…This study delves into the prevalent cryptographic methods and algorithms utilized for prevention and stream encryption, examining their encoding techniques such as advanced encryption standard (AES), Blowfish, Twofish, Salsa20, and ChaCha20. …”
    Get full text
    Article
  12. 12

    Cayley–Purser secured communication and jackknife correlative classification for COVID patient data analysis by Ramesh Sekaran, Ashok Kumar Munnangi, Manikandan Ramachandran, Mohammad Khishe

    Published 2025-02-01
    “…In order to solve these issues, Cayley–Purser Cryptographic Secured Communication based Jackknife Correlative Data Classification (CPCSC-JCDC) method is designed. …”
    Get full text
    Article
  13. 13

    Securing fog computing in healthcare with a zero-trust approach and blockchain by Navjeet Kaur, Ayush Mittal, Umesh Kumar Lilhore, Sarita Simaiya, Surjeet Dalal, Kashif Saleem, Ehab Seif Ghith

    Published 2025-02-01
    “…The integration of BC and SDN supports continuous authentication and monitoring using cryptographic protocols (SHA-256A and RSA-2048) to secure data transmission. …”
    Get full text
    Article
  14. 14

    Analisis Pengaruh Citra Terhadap Kombinasi Kriptografi RSA dan STEGANOGRAFi LSB by Agus Rakhmadi Mido, Erik Iman Heri Ujianto

    Published 2022-02-01
    “…In this study, the technique is Rivest Shamir Adleman (RSA) Cryptographic algorithm and the Least Significant Bit (LSB) Steganography algorithm for message security. …”
    Get full text
    Article