[HTML][HTML] Quantum image encryption protocol for secure communication in healthcare networks

S Prajapat, D Kumar, P Kumar - Cluster Computing, 2025 - Springer
Maintaining patient confidentiality and ensuring data integrity are critical aspects of
healthcare information security. In response to the growing need for enhanced security …

An encryption algorithm for color images based on an improved dual-chaotic system combined with DNA encoding

R Li, T Liu, J Yin - Scientific Reports, 2024 - nature.com
This study improves the Logistic chaotic system and combines it with the hyperchaotic Chen
system to create a dual chaotic system. The algorithm encrypts images in three stages. In the …

[HTML][HTML] A smart agriculture image protection scheme based on annealing algorithm and affine transformation is optimized for S-box generated by chaos

L Zhou, H Chen, X Zhou, Y Yuan, WN Zhu, M Zhou - Nonlinear Dynamics, 2024 - Springer
To strengthen image security in smart agriculture, this paper presents a Two-Dimensional
Super-Attractor Logistic Coupled Chaotic Model (2D-SALC). The model underwent rigorous …

A Secure Key Exchange Protocol and a Public Key Cryptosystem for Healthcare Systems

R Yuvasri, A Manimaran - Contemporary Mathematics, 2024 - ojs.wiserpub.com
Diffie-Hellman (DH) is the reason for the existence of a solution to the key distribution
problem, where two parties can mutually set up a shared secret key over an insecure …

Unit Group  of the Group Algebra

NU Sivaranjani, E Nandakumar, G Mittal… - Armenian Journal of …, 2024 - armjmath.sci.am
In this paper, we consider the general linear group $ GL (2, 7) $ of $2\times 2$ invertible
matrices over the finite field of order $7 $ and compute the unit group of the semisimple …

[引用][C] An Analytic Study of a Novel Algebraic Public Key Encryption Scheme Based on Polynomials over Noncommutative Matrix Ring

S Kanwal, S Inam, R Ali - Journal of Algebra and its Applications, 2024 - World Scientific
Different public key exchange protocols can be employed to design a cryptosystem. The
most famous example is the ElGamal cryptosystem which is based on the Diffie-Hellman key …