This paper presents a novel algorithm for the modulus operation for FPGA implementation. The proposed algorithm use only addition, subtraction, logical, and bit shift operations, avoiding the complexities and hardware...
详细信息
In this paper, we present a novel cryptographic system that integrates Quantum Key Distribution (QKD) with classical encryption techniques to secure steganographic images. Our approach leverages the E91 QKD protocol t...
详细信息
Solving the discrete logarithm problem in a finite prime field is an extremely important computing problem in modern cryptography. The hardness of solving the discrete logarithm problem in a finite prime field is the ...
详细信息
作者:
Yin, Hua-LeiDepartment of Physics
Beijing Key Laboratory of Opto-electronic Functional Materials and Micro-nano Devices Key Laboratory of Quantum State Construction and Manipulation Ministry of Education Renmin University of China Beijing100872 China
One-way functions are fundamental to classical cryptography and their existence remains a longstanding problem in computational complexity theory [1, 2]. Recently, a provable quantum one-way function has been identifi...
详细信息
In 2022, a prominent supersingular isogeny-based cryptographic scheme, namely SIDH, was compromised by a key recovery attack. However, this attack does not undermine the isogeny path problem, which remains central to ...
详细信息
To deal with database security of Management Information System(MIS),a database encryption solution is designed and *** the relation of database openness and security in the traditional model of MIS,the paper construc...
详细信息
To deal with database security of Management Information System(MIS),a database encryption solution is designed and *** the relation of database openness and security in the traditional model of MIS,the paper constructs an improved security model of *** on database encryption theory,a multilevel cipher solution of application system is implemented in SQL Server *** experiments are carried out to compare the time spending of data manipulation based on some encryption algorithms in database. The result shows that the symmetric encryption increases the time cost about 1/3 while the asymmetric encryption increases much *** solution is effective if it is applied to sensible data.
With the advancement of quantum computing, the transition to post-quantum cryptography (PQC) is becoming increasingly critical to maintain the security of modern dependable infrastructural systems. This paper presents...
详细信息
Cryptography, derived from the Greek for "hidden writing," uses mathematical techniques to secure information by making it unreadable. Though the scientific study of cryptography is relatively recent, starti...
详细信息
Cloud Computing is the impending need of computing which is used for the IT Industries It is one of the hottest topic in research areas. Scalibility and Flexibility increases for the computing services. Cloud Computin...
详细信息
ISBN:
(纸本)9781479939152
Cloud Computing is the impending need of computing which is used for the IT Industries It is one of the hottest topic in research areas. Scalibility and Flexibility increases for the computing services. Cloud Computing is the fastest growing technology for IT Industry. The Information is being transmitted via the network therefore security is one of the major issue. The Application is deployed on the Cloud and for the secure transmission of the data we will be using ECC Algorithm in our project because of its advantages in terms of CPU utilization, time for encryption and Key *** Paper will explore the deployment of Application on the Cloud and increases the security level by implementing ECC Algorithm,Digital Signature and encryption.
暂无评论