To see the other types of publications on this topic, follow the link: Encryption (Computer science).

Journal articles on the topic 'Encryption (Computer science)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Encryption (Computer science).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

AlTuhafi, Ammar Waysi. "Adaptation for Vigenère Cipher Method for Auto Binary Files Ciphering." ITM Web of Conferences 42 (2022): 01017. http://dx.doi.org/10.1051/itmconf/20224201017.

Full text
Abstract:
Protecting the private information from third party became an important issue in computer science nowadays; cryptography is a science of encryption and decryption information. The first use of cryptography was in ciphering text messages, with the developing of computer usage; other type of files has been appeared such as: picture, audio, video, etc. These types of files can carry private information that needs to be saved from the third part. This paper based on design and implement system for auto encryption/decryption binary files by adapting well-knownVigenère encryption methods, by convert
APA, Harvard, Vancouver, ISO, and other styles
2

Banerjee, Debjeet, Sagnik Dutta, Souvik Bhattacharyya, Sujan Sarkar, Sneha Rakshit, and Raktim Chakraborty. "NUMBER THEORY AND THEIR APPLICATION IN COMPUTER SCIENCE AND CRYPTOGRAPHY." Journal of Mathematical Sciences & Computational Mathematics 2, no. 1 (2020): 84–89. http://dx.doi.org/10.15864/jmscm.2106.

Full text
Abstract:
Here we have briefly discussed the various applications of number theory in the fields of Computation with special emphasis on Encryption algorithms. We have laid special emphasis on prime numbers and briefly touched upon their importance in modern day Cryptography , especially in RSA Encryption which is the most widely used encryption technique nowadays.
APA, Harvard, Vancouver, ISO, and other styles
3

Bozduman, Hanife Çağıl, and Erkan Afacan. "Simulation of a Homomorphic Encryption System." Applied Mathematics and Nonlinear Sciences 5, no. 1 (2020): 479–84. http://dx.doi.org/10.2478/amns.2020.1.00046.

Full text
Abstract:
AbstractCryptology is defined as the science of making communication incomprehensible to third parties who have no right to read and understand the data or messages. Cryptology consists of two parts, namely, cryptography and cryptanalysis. Cryptography analyzes methods of encrypting messages, and cryptanalysis analyzes methods of decrypting encrypted messages. Encryption is the process of translating plaintext data into something that appears to be random and meaningless. Decryption is the process of converting this random text into plaintext. Cloud computing is the legal transfer of computing
APA, Harvard, Vancouver, ISO, and other styles
4

Singh, Pankaj, and Sachin Kumar. "Study & analysis of cryptography algorithms : RSA, AES, DES, T-DES, blowfish." International Journal of Engineering & Technology 7, no. 1.5 (2017): 221. http://dx.doi.org/10.14419/ijet.v7i1.5.9150.

Full text
Abstract:
Cryptography is about protecting the data from third parties or from public to read confidential data. Cryptography mainly focuses on encrypting the data or we can say converting the data and decrypting the actual data or we can say reconverting the data by different methods. These encryption and decryption methods are based on mathematical theories and are implemented by computer science practices. But as cryptography progressed ways were found to decode the secured data and view actual data. This was also done by the use of mathematical theories and computer science practices. Popular algori
APA, Harvard, Vancouver, ISO, and other styles
5

Glen, Jode. "Security Risks in Computer Networks and Application of Data Encryption Techniques." Computer Life 12, no. 1 (2024): 5–7. http://dx.doi.org/10.54097/x4eym481.

Full text
Abstract:
With the rapid development of science and technology, people through the computer network for the transmission and exchange of information and data is more and more convenient. This paper analyzes the current situation of computer network security, hidden dangers and the principle of data encryption technology, and discusses the application of data encryption technology in computer network security.
APA, Harvard, Vancouver, ISO, and other styles
6

Yang, Junpu. "Computer Data Encryption System Based on Nonlinear Partial Differential Equations." Mobile Information Systems 2022 (August 19, 2022): 1–9. http://dx.doi.org/10.1155/2022/3395019.

Full text
Abstract:
Data encryption is to convert plaintext data into ciphertext through a data encryption algorithm and then transmit the ciphertext. After the recipient receives the ciphertext, the ciphertext is restored to plaintext, which provides protection and technical support for information security. The main purpose of this article is to design a computer data encryption system based on nonlinear partial differential equations. This paper uses the DES encryption algorithm to encrypt data and implements an onion encryption system that encrypts the outer layer of the database and tests and analyzes the en
APA, Harvard, Vancouver, ISO, and other styles
7

Alsalam Ali, Nashwan, Abdul Monem S. Rahma, and Shaimaa H. Shaker. "Survey on 3D Content Encryption." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 15 (2021): 115. http://dx.doi.org/10.3991/ijim.v15i15.24179.

Full text
Abstract:
<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers
APA, Harvard, Vancouver, ISO, and other styles
8

Kumar, B.Ravi, Chandra Sekhar A., and G.Appala Naidu. "An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines." COMPUSOFT: An International Journal of Advanced Computer Technology 04, no. 03 (2015): 1548–54. https://doi.org/10.5281/zenodo.14770594.

Full text
Abstract:
Cryptography is the combination of Mathematics and Computer science. Cryptography is used for encryption and decryption of data using mathematics. Cryptography transit the information in an illegible manner such that only intended recipient will be able to decrypt the information. In the recent years, researchers developed several new encryption methods. Among such ElGamal encryption is the one laid a concede platform for the researchers in Cryptography. Ever science several mathematical models were applied for encryption/decryption. In this paper, we introduced an ElGamal encryption, which us
APA, Harvard, Vancouver, ISO, and other styles
9

Kuo, Tzu-Hsiang, and Ja-Ling Wu. "A High Throughput BFV-Encryption-Based Secure Comparison Protocol." Mathematics 11, no. 5 (2023): 1227. http://dx.doi.org/10.3390/math11051227.

Full text
Abstract:
Secure comparison is a fundamental problem in multiparty computation. There are two different parties, each holding an l-bit integer, denoted by 𝑎 and 𝑏, respectively. The goal of secure comparison is to compute the order relationship between 𝑎 and 𝑏, say (𝑎 > 𝑏) ∈ {0.1}, without revealing their inputs to any others. Since previous solutions based on homomorphic encryption need at least Ω(l) encryptions for each l-bit comparison, the total encryption time leads to a computational bottleneck for these protocols. This work presents a fast, semi-honest, secure comparison protocol based on the
APA, Harvard, Vancouver, ISO, and other styles
10

REN, YANLI, DAWU GU, SHUOZHONG WANG, and XINPENGU ZHANG. "HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES." International Journal of Foundations of Computer Science 21, no. 06 (2010): 1049–63. http://dx.doi.org/10.1142/s0129054110007726.

Full text
Abstract:
In a proxy re-encryption scheme, a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been proposed in public key settings. Hierarchical identity-based cryptography is a generalization of identity-based encryption that mirrors an organizational hierarchy, which allows a root private key generator to distribute the workload by delegating private key generation and identity authentication to lower-level private key generators. In this paper, we propose a hierarchical identity-based proxy re-encryption (
APA, Harvard, Vancouver, ISO, and other styles
11

Ayo-Aderele, A. O., S. O. Edeki, V. O. Udjor, and O. Ugbenu. "A note on matrix algebra for cryptography settings and applications." Journal of Physics: Conference Series 2199, no. 1 (2022): 012016. http://dx.doi.org/10.1088/1742-6596/2199/1/012016.

Full text
Abstract:
Abstract Cryptography is an interdisciplinary topic that adopts concepts from several disciplines. In today’s environment, cryptography makes important use of computer science and mathematics, especially discrete mathematics. This study aims to discuss the daily use of matrices in cryptography. Globally, secure text communication is critical while various cryptosystems exist to accomplish this security. Hence, with regard to the cryptosystem, the key matrix from the plane’s equation is considered by determining the orthogonal matrix that implements reflection. This method boosts encryption sec
APA, Harvard, Vancouver, ISO, and other styles
12

Huang, Yongzhong, Xueguang Bi, Yucheng Liu, and Yuxia Li. "Development of a Novel Hyperchaos-Based Image Encryption Algorithm Consisting of Two Scrambling-Diffusion Operations." Complexity 2022 (October 4, 2022): 1–15. http://dx.doi.org/10.1155/2022/8765268.

Full text
Abstract:
This paper proposes a hyperchaos-based image encryption algorithm, which consists of two scrambling-diffusion operations and one scrambling operation. In the proposed algorithm, the initial conditions of a hyperchaotic Chen system are first generated using the Message Digest 5 (MD5) value of digital images and given initial values, and then the images will be encrypted using the keystream created by the system. Since the initial values of hyperchaotic Chen systems are related to plaintext and the encryption process is related to the images, this algorithm is able to effectively protect images
APA, Harvard, Vancouver, ISO, and other styles
13

Raghad Abdulaali Azeez, Abeer Salim Jamil, and Mohammed Salih Mahdi. "A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection." International Journal of Interactive Mobile Technologies (iJIM) 17, no. 07 (2023): 69–81. http://dx.doi.org/10.3991/ijim.v17i07.38753.

Full text
Abstract:
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizi
APA, Harvard, Vancouver, ISO, and other styles
14

Liu, Guanxiu. "The Application of Data Encryption Technology in Computer Network Communication Security." Mobile Information Systems 2022 (August 29, 2022): 1–10. http://dx.doi.org/10.1155/2022/3632298.

Full text
Abstract:
With the development of computer network and the popularization of information system, the security of databases, as platforms for centralized storage and sharing of information system data, has increasingly become a serious problem in the field of information security, so data encryption technology has come into people’s sight. However, the current data encryption technology still has certain shortcomings, such as the inconsistency of the code text of the encryption and decryption technology, and the low efficiency of decoding and encryption. The purpose of this paper is to study the applicat
APA, Harvard, Vancouver, ISO, and other styles
15

Yeow, Sin-Qian, and Kok-Why Ng. "Neural Network Based Data Encryption: A Comparison Study among DES, AES, and HE Techniques." JOIV : International Journal on Informatics Visualization 7, no. 3-2 (2023): 2086. http://dx.doi.org/10.30630/joiv.7.3-2.2336.

Full text
Abstract:
With the improvement of technology and the continuous expansion and deepening of neural network technology, its application in computer network security plays an important role. However, the development of neural networks is accompanied by new threats and challenges. This paper proposes to encrypt the weight data using encryption algorithms and embed image encryption algorithms to improve protected data security further. The purpose is to address the feasibility and effectiveness of using modern encryption algorithms for data encryption in machine learning in response to data privacy breaches.
APA, Harvard, Vancouver, ISO, and other styles
16

Nurhidayati, Rika, and Salauddin Muis. "Analysis Of Voice Data Security Security By Using The Rc4 Algorithm." Jurnal Info Sains : Informatika dan Sains 11, no. 2 (2021): 22–28. http://dx.doi.org/10.54209/infosains.v11i2.44.

Full text
Abstract:
Data security and confidentiality is one of the most important aspects in the field of communication, especially communication using computer media. One of the fields of science that is used to secure data is cryptography. Cryptography is a science that uses mathematical equations to encrypt and decrypt data. Encryption is the process of converting plaintext (readable data) into ciphertext (unreadable data) and decryption is the opposite of encryption, which changes ciphertext back into plaintext. In this study, the RC4 algorithm will be discussed to encrypt and decrypt mp3 files stored on the
APA, Harvard, Vancouver, ISO, and other styles
17

Kanshi, Avaneesh, Rajkumar Soundrapandiyan, V. S. Anita Sofia, and V. R. Rajasekar. "Hybridized Cryptographic Encryption and Decryption Using Advanced Encryption Standard and Data Encryption Standard." Cybernetics and Information Technologies 23, no. 4 (2023): 63–78. http://dx.doi.org/10.2478/cait-2023-0036.

Full text
Abstract:
Abstract This research proposes an efficient hybridized approach for symmetrical encryption of image files in bitmap formats. Due to the heavy use of lightweight encryption in fields such as military and corporate workplaces, intruders try to intercept communication through illegal means and gain access to classified information. This can result in heavy losses if the leaked image data is misused. The proposed enhances the security and efficiency of one of the most used standard symmetric algorithms, Advanced Encryption Standard (AES). In the proposed method, the AES architecture has been modi
APA, Harvard, Vancouver, ISO, and other styles
18

Boneh, Dan, Amit Sahai, and Brent Waters. "Functional encryption." Communications of the ACM 55, no. 11 (2012): 56–64. http://dx.doi.org/10.1145/2366316.2366333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Köhler, Mirko, Ivica Lukić, and Višnja Križanović Čik. "Protecting Information with Subcodstanography." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/9130683.

Full text
Abstract:
In modern communication systems, one of the most challenging tasks involves the implementation of adequate methods for successful and secure transfer of confidential digital information over an unsecured communication channel. Many encryption algorithms have been developed for protection of confidential information. However, over time, flaws have been discovered even with the most sophisticated encryption algorithms. Each encryption algorithm can be decrypted within sufficient time and with sufficient resources. The possibility of decryption has increased with the development of computer techn
APA, Harvard, Vancouver, ISO, and other styles
20

Abusham, Eimad, Basil Ibrahim, Kashif Zia, and Sanad Al Maskari. "An Integration of New Digital Image Scrambling Technique on PCA-Based Face Recognition System." Scientific Programming 2022 (November 25, 2022): 1–17. http://dx.doi.org/10.1155/2022/2628885.

Full text
Abstract:
Systems using biometric authentication offer greater security than traditional textual and graphical password-based systems for granting access to information systems. Although biometric-based authentication has its benefits, it can be vulnerable to spoofing attacks. Those vulnerabilities are inherent to any biometric-based subsystem, including face recognition systems. The problem of spoofing attacks on face recognition systems is addressed here by integrating a newly developed image encryption model onto the principal component pipeline. A new model of image encryption is based on a cellular
APA, Harvard, Vancouver, ISO, and other styles
21

Joshi, Bineet, Bansidhar Joshi, Anupama Mishra, Varsha Arya, Avadhesh Kumar Gupta, and Dragan Peraković. "A Comparative Study of Privacy-Preserving Homomorphic Encryption Techniques in Cloud Computing." International Journal of Cloud Applications and Computing 12, no. 1 (2022): 1–11. http://dx.doi.org/10.4018/ijcac.309936.

Full text
Abstract:
In cloud computing, a third party hosts a client's data, which raises privacy and security concerns. To maintain privacy, data should be encrypted by cryptographic techniques. However, encrypting the data makes it unsuitable for indexing and fast processing, as data needs to be decrypted to plain text before it can be further processed. Homomorphic encryption helps to overcome this shortcoming by allowing users to perform operations on encrypted data without decryption. Many academics have attempted to address the issue of data security, but none have addressed the issue of data privacy in clo
APA, Harvard, Vancouver, ISO, and other styles
22

Hao-Qiang Xu, Hao-Qiang Xu, and Jian-Dong Liu Hao-Qiang Xu. "Research on Video Encryption Technology Based on Cross Coupled Map Lattices System." 電腦學刊 34, no. 2 (2023): 175–89. http://dx.doi.org/10.53106/199115992023043402013.

Full text
Abstract:
<p>The traditional video encryption algorithm only encrypts video images, which has the problems of an extended time-consuming algorithm and poor format retention. To improve the efficiency of video encryption, this paper proposes a multi-link selective video encryption algorithm based on the Cross Coupled Map Lattices system by combining H.264/AVC video coding structure. The algorithm reduces the amount of encrypted data while ensuring encryption security to satisfy the needs of video encryption security and real-time performance. The encryption algorithm’s security and visual encryptio
APA, Harvard, Vancouver, ISO, and other styles
23

Liu, Muhua, and Ping Zhang. "An Adaptively Secure Functional Encryption for Randomized Functions." Computer Journal 63, no. 8 (2020): 1247–58. http://dx.doi.org/10.1093/comjnl/bxz154.

Full text
Abstract:
Abstract Functional encryption (FE) can provide a fine-grained access control on the encrypted message. Therefore, it has been applied widely in security business. The previous works about functional encryptions most focused on the deterministic functions. The randomized algorithm has wide application, such as securely encryption algorithms against chosen ciphertext attack, privacy-aware auditing. Based on this, FE for randomized functions was proposed. The existing constructions are provided in a weaker selective security model, where the adversary is forced to output the challenge message be
APA, Harvard, Vancouver, ISO, and other styles
24

Setti, Sunil, Indra Gunawan, Bahrudi Efendi Damanik, Sumarno Sumarno, and Ika Okta Kirana. "Implementasi Algoritma Advanced Encryption Standard dalam Pengamanan Data Penjualan Ramayana Department Store." JURIKOM (Jurnal Riset Komputer) 7, no. 1 (2020): 182. http://dx.doi.org/10.30865/jurikom.v7i1.1960.

Full text
Abstract:
Ramayana Department Store is one of the companies engaged in the business of retail supermarket. The company uses computer science technology applied in servicing activities, particularly in the sales data storage. Sales data is the information generated from sales transaction activities that obtained by the company through marketing activities to make profits. The use of computers in storing sales data is used to improve data security so that the valuable information can be confidentiality guaranteed. To avoid data theft and data manipulation,we need to implement a security system. Cryptograp
APA, Harvard, Vancouver, ISO, and other styles
25

Wolfe, Hank. "Encountering encryption." Computers & Security 22, no. 5 (2003): 388–91. http://dx.doi.org/10.1016/s0167-4048(03)00504-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Schenkel, I. "Beyond encryption." ITNOW 51, no. 2 (2009): 8–9. http://dx.doi.org/10.1093/itnow/bwp025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Abe, Masayuki, Yang Cui, Hideki Imai, and Eike Kiltz. "Efficient hybrid encryption from ID-based encryption." Designs, Codes and Cryptography 54, no. 3 (2009): 205–40. http://dx.doi.org/10.1007/s10623-009-9320-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Le, Minh Ha, Vinh Duc Tran, Van Anh Trinh, and Viet Cuong Trinh. "Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption." Theoretical Computer Science 804 (January 2020): 219–35. http://dx.doi.org/10.1016/j.tcs.2019.11.034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Kanungo, Avnish, Ayushi Srivastava, Saniya Anklesaria, and Prathamesh Churi. "A systematic review on video encryption algorithms: A future research." Journal of Autonomous Intelligence 6, no. 2 (2023): 665. http://dx.doi.org/10.32629/jai.v6i2.665.

Full text
Abstract:
<p>Video Encryption is widely used in many real-time applications today. Despite numerous video encryption techniques that are available today, the challenges such as time and space complexity, real time latency, scalability and vulnerability towards few attacks still exist in the research domain, however few algorithms have achieved acceptable computational complexity, but in such cases vulnerability to certain attacks (differential, statistical, plain text attack, and cipher text attacks) are still a threat to secure video transmission. To the best of our knowledge, a comprehensive but
APA, Harvard, Vancouver, ISO, and other styles
30

Berisha, Artan, and Hektor Kastrati. "Parallel impelementation of RC6 algorithm." Journal of Computer Science and Technology Studies 3, no. 2 (2021): 01–09. http://dx.doi.org/10.32996/jcsts.2021.3.2.1.

Full text
Abstract:
Data security is very important in the field of Computer Science. In this paper the encryption algorithm called RC6 will be analyzed and its standard and parallel implementation will be done.
 First the field of Cryptology is discussed in general terms, then the classification of encryption algorithms according to operation and techniques is explained.
 RC6 is a symmetric block algorithm derived from the RC5 algorithm. RC6 operates on 128-bit blocks and accepts 128, 192, 256-bit keys until 2040 bytes. In the Advanced Encryption Standard (AES) competition, RC6 managed to rank among th
APA, Harvard, Vancouver, ISO, and other styles
31

Mone, Gregory. "Future-proof encryption." Communications of the ACM 56, no. 11 (2013): 12–14. http://dx.doi.org/10.1145/2524713.2524718.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Communications of the ACM Staff, CORPORATE. "Debating encryption standards." Communications of the ACM 35, no. 7 (1992): 32–34. http://dx.doi.org/10.1145/129902.129903.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Phuong, Tran Viet Xuan, Guomin Yang, and Willy Susilo. "Criteria-Based Encryption." Computer Journal 61, no. 4 (2017): 512–25. http://dx.doi.org/10.1093/comjnl/bxx088.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Feigenbaum, Joan. "Encryption and surveillance." Communications of the ACM 62, no. 5 (2019): 27–29. http://dx.doi.org/10.1145/3319079.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Papadopoulos, Iason, and Jiabo Wang. "Polar Codes for Module-LWE Public Key Encryption: The Case of Kyber." Cryptography 7, no. 1 (2023): 2. http://dx.doi.org/10.3390/cryptography7010002.

Full text
Abstract:
In modern society, the Internet is one of the most used means of communication. Thus, secure information transfer is inevitably of major importance. Computers nowadays use encryption methods based on arithmetic operations to turn messages into ciphertexts that are practically impossible for an attacker to reverse-engineer using a classical computer. Lately, it has been proven that this is possible in a post-quantum setting where quantum computers of considerable size are available to attackers. With the advance of technology of quantum computers, it is now more necessary than ever before to co
APA, Harvard, Vancouver, ISO, and other styles
36

A. Rashid, Abdullah, and Khalid A. Hussein. "Image encryption algorithm based on the density and 6D logistic map." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 1903. http://dx.doi.org/10.11591/ijece.v13i2.pp1903-1913.

Full text
Abstract:
One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypt
APA, Harvard, Vancouver, ISO, and other styles
37

Mao, Ying. "Algorithm of Encrypting Digital Image Using Chaos Neural Network." Advances in Multimedia 2022 (September 21, 2022): 1–10. http://dx.doi.org/10.1155/2022/4160083.

Full text
Abstract:
With the rapid development of digital communication technology, data and image encryption methods will get more and more in-depth research in these aspects. Although the original cipher method can keep the image confidential, because of the storage method of the image data, for the image with too high pixel value, the process of keeping the two-dimensional information confidential and decoding will bring a large amount of computation, and the accuracy of encryption and decryption cannot be guaranteed. This paper presents a visual image encryption algorithm based on the compressed sensing metho
APA, Harvard, Vancouver, ISO, and other styles
38

Chen, Meixi. "Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm." Complexity 2021 (June 4, 2021): 1–12. http://dx.doi.org/10.1155/2021/7212688.

Full text
Abstract:
With the application of computer and network technology in the field of accounting, the development of accounting informationization is an inevitable trend, and the construction of accounting statement data into the data warehouse will be the basis of intelligent decision-making. The complexity of industry accounting statements and the arbitrariness and diversity of users’ needs for obtaining information using statements limit the development, popularization, and application of industry accounting statements. As a block encryption algorithm, the Data Encryption Standard (DES) algorithm uses 64
APA, Harvard, Vancouver, ISO, and other styles
39

Cheddour, Zakariae, Abdelhakim Chillali, and Ali Mouhib. "Generalized Fibonacci Sequences for Elliptic Curve Cryptography." Mathematics 11, no. 22 (2023): 4656. http://dx.doi.org/10.3390/math11224656.

Full text
Abstract:
The Fibonacci sequence is a well-known sequence of numbers with numerous applications in mathematics, computer science, and other fields. In recent years, there has been growing interest in studying Fibonacci-like sequences on elliptic curves. These sequences have a number of exciting properties and can be used to build new encryption systems. This paper presents a further generalization of the Fibonacci sequence defined on elliptic curves. We also describe an encryption system using this sequence which is based on the discrete logarithm problem on elliptic curves.
APA, Harvard, Vancouver, ISO, and other styles
40

GAATA, Methaq Talib, and Fadya Fouad Hantoosh. "Encrypted Image Retrieval System based on Features Analysis." Al-Mustansiriyah Journal of Science 28, no. 3 (2018): 166. http://dx.doi.org/10.23851/mjs.v28i3.77.

Full text
Abstract:
Abstract – Content-based search provides an important tool for users to consume the ever-growing digital media repositories. However, since communication between digital products takes place in a public network, the necessity of security for digital images becomes vital. Hence, the design of secure content-based image retrieval system is becoming an increasingly demanding task as never before. This paper, presents a mechanism that addresses the secure CBIR as a novel improvement and application for the image retrieval. The proposed system consists of six phases briefly described as follows: fi
APA, Harvard, Vancouver, ISO, and other styles
41

Zhang, Shijie, Lingfeng Liu, and Hongyue Xiang. "A Novel Plain-Text Related Image Encryption Algorithm Based on LB Compound Chaotic Map." Mathematics 9, no. 21 (2021): 2778. http://dx.doi.org/10.3390/math9212778.

Full text
Abstract:
Chaos systems have been widely used in image encryption algorithms. In this article, we introduce an LB (Logistic-Baker) compound chaotic map that can greatly improve the complexity of original Logistic map and Baker map, as well as the generated sequences have pseudo-randomness. Furthermore, based on the LB compound chaotic map, an image encryption algorithm is proposed. To resist the differential attack, and enhance the sensitivity of plain-text, the parameters of this algorithm are plain-text related. In this algorithm, the compound chaotic function is influenced by the plain-text image; th
APA, Harvard, Vancouver, ISO, and other styles
42

Zhou, Hao, and Haochang Bi. "Wireless Sensor Network Security Based on Improved Identity Encryption." Scientific Programming 2022 (April 1, 2022): 1–10. http://dx.doi.org/10.1155/2022/2308825.

Full text
Abstract:
In order to protect network information security and improve the security of wireless sensor networks, based on chaotic systems, we propose a wireless sensor algorithm based on improved identity encryption. First, the basic principle of chaotic system mapping is specifically analyzed; the two chaotic mapping systems are rectified to obtain the hybrid chaotic mapping system according to the demand of wireless sensing network. After that, an encryption framework and key are designed and the hybrid mapping system is applied to the encryption framework to encrypt the data. In this way, the length
APA, Harvard, Vancouver, ISO, and other styles
43

Ibrahim, Dina, Kareem Ahmed, Mohamed Abdallah, and AbdElmgeid A. Ali. "A New Chaotic-Based RGB Image Encryption Technique Using a Nonlinear Rotational 16 × 16 DNA Playfair Matrix." Cryptography 6, no. 2 (2022): 28. http://dx.doi.org/10.3390/cryptography6020028.

Full text
Abstract:
Due to great interest in the secure storage and transmission of color images, the necessity for an efficient and robust RGB image encryption technique has grown. RGB image encryption ensures the confidentiality of color images during storage and transmission. In the literature, a large number of chaotic-based image encryption techniques have been proposed, but there is still a need for a robust, efficient and secure technique against different kinds of attacks. In this paper, a novel RGB image encryption technique is proposed for encrypting individual pixels of RGB images using chaotic systems
APA, Harvard, Vancouver, ISO, and other styles
44

Yuan, Ke, Peng Sang, Suya Zhang, Xi Chen, Wei Yang, and Chunfu Jia. "An electronic voting scheme based on homomorphic encryption and decentralization." PeerJ Computer Science 9 (October 18, 2023): e1649. http://dx.doi.org/10.7717/peerj-cs.1649.

Full text
Abstract:
Compared with paper-based voting, electronic voting not only has advantages in storage and transmission, but also can solve the security problems that exist in traditional voting. However, in practice, most electronic voting faces the risk of voting failure due to malicious voting by voters or ballot tampering by attackers. To solve this problem, this article proposes an electronic voting scheme based on homomorphic encryption and decentralization, which uses the Paillier homomorphic encryption method to ensure that the voting results are not leaked until the election is over. In addition, the
APA, Harvard, Vancouver, ISO, and other styles
45

El-Yahyaoui, Ahmed, and Mohamed Daifr Ech-Cherif El Kettani. "About Fully Homomorphic Encryption Improvement Techniques." International Journal of Embedded and Real-Time Communication Systems 10, no. 3 (2019): 1–20. http://dx.doi.org/10.4018/ijertcs.2019070101.

Full text
Abstract:
Fully homomorphic encryption schemes (FHE) are a type of encryption algorithm dedicated to data security in cloud computing. It allows for performing computations over ciphertext. In addition to this characteristic, a verifiable FHE scheme has the capacity to allow an end user to verify the correctness of the computations done by a cloud server on his encrypted data. Since FHE schemes are known to be greedy in term of processing consumption and slow in terms of runtime execution, it is very useful to look for improvement techniques and tools to improve FHE performance. Parallelizing computatio
APA, Harvard, Vancouver, ISO, and other styles
46

ROZLOMII, Inna. "METHOD OF CONSTRUCTION MATRIX CARDANO’S GRIDS FOR COMPRESSION OF INFORMATION." Herald of Khmelnytskyi National University 305, no. 1 (2022): 84–89. http://dx.doi.org/10.31891/2307-5732-2022-305-1-84-89.

Full text
Abstract:
Due to the rapid development of computer technology and the information field, issues related to information security are becoming increasingly important. Knowledge of information security tools is required for the effective organization of the process of transmission and storage of classified information. The main means of information protection such as encryption, compression and covert transmission of information are present in the article . Information security techniques, including cryptographic data protection systems, play an important role in today’s information-filled world. The means
APA, Harvard, Vancouver, ISO, and other styles
47

Gupta, Dr Vikram. "Recent Advancements in Computer Science: A Comprehensive Review of Emerging Technologies and Innovations." International Journal for Research Publication and Seminars 14, no. 1 (2023): 329–34. http://dx.doi.org/10.36676/jrps.2023-v14i1-42.

Full text
Abstract:
Recent advances in computer science have led to many new technologies and inventions that continue to affect our environment. This extensive study highlights some of the most significant computer science discoveries and their possible applications. This assessment begins with AI, which has driven many recent achievements. Cutting-edge machine learning methods, deep neural networks, reinforcement learning, and explainable AI are discussed. AI and adjacent sciences like natural language processing (NLP) and computer vision have led to innovative applications in healthcare, finance, autonomous ca
APA, Harvard, Vancouver, ISO, and other styles
48

Meyer, Helen. "Decoding encryption policy." Computers & Security 15, no. 3 (1996): 225. http://dx.doi.org/10.1016/s0167-4048(96)90310-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Zhao, Zichun. "Evolution of the encryption and analysis of algorithm." Applied and Computational Engineering 52, no. 1 (2024): 292–95. http://dx.doi.org/10.54254/2755-2721/52/20241674.

Full text
Abstract:
This paper examines how cryptography has developed from the ancient kingdom to the present and examines what modern humans understand by an acceptable encryption scheme. The significance of encryption is evident; it is typically present in data, banks and governments in offline procedures, or VPNs in online ones. Additionally, the research shows how cryptography manifests itself in the world and highlights the confidentiality and universality of encryption techniques. However, the article also discusses the similarities and differences between pure mathematics and cryptography. It presents the
APA, Harvard, Vancouver, ISO, and other styles
50

Abdalla, Michel, Mihir Bellare, and Gregory Neven. "Robust Encryption." Journal of Cryptology 31, no. 2 (2017): 307–50. http://dx.doi.org/10.1007/s00145-017-9258-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!