RGB image encryption based on symmetric keys using Arnold transform, 3D chaotic map and affine hill cipher

MA Lone, S Qureshi - Optik, 2022 - Elsevier
In this work, we propose a novel color image encryption scheme based on symmetric keys
using the synergistic approach of Arnold transform, 3D logistic chaotic map with XOR …

Digital image encryption using elliptic curve cryptography: A review

M Habek, Y Genc, N Aytas, A Akkoc… - … Congress on Human …, 2022 - ieeexplore.ieee.org
Today, digital images are used in many different applications. They can be social media
applications or critical applications such as military and medical. However, cyber attacks or …

ELCPAS: A new efficient lightweight certificateless conditional privacy preserving authentication scheme for IoV

Y Genc, N Aytas, A Akkoc, E Afacan… - Vehicular Communications, 2023 - Elsevier
This paper proposes a new efficient certificateless conditional privacy preserving
authentication (CL-CPPA) scheme named ELCPAS, which is pairing-free, energy-efficient …

A heterogeneous online/offline signcryption scheme for Internet of Vehicles

Z Chen, C Jin, G Chen, Y Jin, H Zong - Vehicular Communications, 2023 - Elsevier
With the rapid development of wireless communication and autonomous driving
technologies, the Internet of Vehicles (IoV) technology has emerged to build a large network …

TEXCEL: text encryption with elliptic curve cryptography for enhanced security

PL Sharma, S Gupta, H Monga, A Nayyar… - Multimedia Tools and …, 2024 - Springer
Elliptic curve cryptography has emerged as a potent tool for safeguarding data
communications. This research paper addresses the problem of traditional text encryption …

A heterogeneous signcryption scheme with Cryptographic Reverse Firewalls for IoT and its application

N Eltayieb, R Elhabob, Y Liao, F Li, S Zhou - Journal of Information Security …, 2024 - Elsevier
The Snowden leaks exposed the truth that skilled attackers can access users' devices and
steal their private information. Although public key encryption is widely used and …

A novel identity-based privacy-preserving anonymous authentication scheme for vehicle-to-vehicle communication

Y Genc, C Korkuc, N Aytas, E Afacan… - Elektronika ir …, 2023 - avesis.tedu.edu.tr
This paper proposes a novel bilinear pairing-free identity-based privacy-preserving
anonymous authentication scheme for vehicle-to-vehicle (V2V) communication, called …

Elliptic curve cryptography for security in connected vehicles

Y Genç, M Habek, N Aytaş, A Akkoç… - 2022 30th Signal …, 2022 - ieeexplore.ieee.org
The concept of a connected vehicle refers to the linking of vehicles to each other and to
other things. Today, developments in the Internet of Things (IoT) and 5G have made a …

A Blockchain‐Based Proxy Re‐Encryption Scheme With Cryptographic Reverse Firewall for IoV

C Jin, Z Chen, W Qin, K Sun, G Chen… - International Journal of …, 2024 - Wiley Online Library
As the internet of vehicles (IoV) technology develops, it promotes the intelligent interaction
among vehicles, roadside units, and the environment. Nevertheless, it also brings vehicle …

A lightweight identity-based authentication scheme using elliptic curve cryptography for resource-constrained IoT devices

Y Genc, E Afacan - … Networks for Industrial Internet of Things …, 2022 - taylorfrancis.com
Internet of Things (IoT) technology is increasing in popularity with its use in applications
such as smart grids, smart cities, smart homes, smart transportation systems (ITS), and e …