[HTML][HTML] Quantum image encryption protocol for secure communication in healthcare networks
Maintaining patient confidentiality and ensuring data integrity are critical aspects of
healthcare information security. In response to the growing need for enhanced security …
healthcare information security. In response to the growing need for enhanced security …
An encryption algorithm for color images based on an improved dual-chaotic system combined with DNA encoding
R Li, T Liu, J Yin - Scientific Reports, 2024 - nature.com
This study improves the Logistic chaotic system and combines it with the hyperchaotic Chen
system to create a dual chaotic system. The algorithm encrypts images in three stages. In the …
system to create a dual chaotic system. The algorithm encrypts images in three stages. In the …
[HTML][HTML] A smart agriculture image protection scheme based on annealing algorithm and affine transformation is optimized for S-box generated by chaos
L Zhou, H Chen, X Zhou, Y Yuan, WN Zhu, M Zhou - Nonlinear Dynamics, 2024 - Springer
To strengthen image security in smart agriculture, this paper presents a Two-Dimensional
Super-Attractor Logistic Coupled Chaotic Model (2D-SALC). The model underwent rigorous …
Super-Attractor Logistic Coupled Chaotic Model (2D-SALC). The model underwent rigorous …
A Secure Key Exchange Protocol and a Public Key Cryptosystem for Healthcare Systems
R Yuvasri, A Manimaran - Contemporary Mathematics, 2024 - ojs.wiserpub.com
Diffie-Hellman (DH) is the reason for the existence of a solution to the key distribution
problem, where two parties can mutually set up a shared secret key over an insecure …
problem, where two parties can mutually set up a shared secret key over an insecure …
Unit Group of the Group Algebra
In this paper, we consider the general linear group $ GL (2, 7) $ of $2\times 2$ invertible
matrices over the finite field of order $7 $ and compute the unit group of the semisimple …
matrices over the finite field of order $7 $ and compute the unit group of the semisimple …
[引用][C] An Analytic Study of a Novel Algebraic Public Key Encryption Scheme Based on Polynomials over Noncommutative Matrix Ring
S Kanwal, S Inam, R Ali - Journal of Algebra and its Applications, 2024 - World Scientific
Different public key exchange protocols can be employed to design a cryptosystem. The
most famous example is the ElGamal cryptosystem which is based on the Diffie-Hellman key …
most famous example is the ElGamal cryptosystem which is based on the Diffie-Hellman key …