An efficient routing protocol for quantum key distribution networks

J Yao, Y Wang, Q Li, H Mao, AAA El-Latif, N Chen - Entropy, 2022 - mdpi.com
Quantum key distribution (QKD) can provide point-to-point information-theoretic secure key
services for two connected users. In fact, the development of QKD networks needs more …

An improved secure image hiding technique using PN-sequence based on DCT-OTP

MNM Najih, EH Rachmawanto, CA Sari… - 2017 1st International …, 2017 - ieeexplore.ieee.org
The security of sending confidential data on the internet is very important. Thus, the data
security techniques must be developed. Techniques like cryptography and steganography …

Distributed & scalable oblivious sorting and shuffling

N Ngai, I Demertzis, JG Chamani… - Cryptology ePrint …, 2024 - eprint.iacr.org
Existing oblivious systems offer robust security by concealing memory access patterns, but
they encounter significant scalability and performance challenges. Recent efforts to enhance …

Improved Color Image Encryption using Hybrid Modulus Substitution Cipher and Chaotic Method.

B Harjo… - International Journal of …, 2021 - search.ebscohost.com
This study proposes the hybrid substitution cryptography method followed by chaotic
methods to improve the security of digital image transactions on the internet. The substitution …

SEDIBLOFRA: A blockchain-based, secure framework for remote data transfer in unmanned aerial vehicles

J Rodríguez-Molina, B Corpas, C Hirsch… - IEEE …, 2021 - ieeexplore.ieee.org
Security attacks on Cyber-Physical Systems with operations that involve Unmanned Aerial
Vehicles (UAVs) are a matter of great concern due to their major impact in the deployed …

[图书][B] Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean Approach

B Zolfaghari, K Bibak - 2022 - books.google.com
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-
secure cryptosystem guarantees that the malicious third party cannot guess anything …

An empirical study of cryptographic libraries for MPI communications

A Naser, M Gavahi, C Wu, VT Hoang… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
As High Performance Computing (HPC) applications with data security requirements are
increasingly moving to execute in the public cloud, there is a demand that the cloud …

Security analysis of improved one-time pad cryptography using TRNG key generator

EMM Manucom, BD Gerardo… - 2019 IEEE 5th …, 2019 - ieeexplore.ieee.org
Cryptography is one of the important aspect of data and information security. The security
strength of cryptographic algorithms rely on the secrecy and randomness of keys. In this …

Kombinasi Algoritma One Time Pad dan Chaotic Sequence dalam Optimasi Enkripsi Gambar

EH Rachmawanto, CA Sari - Simetris: Jurnal Teknik Mesin …, 2017 - jurnal.umk.ac.id
Pada makalah ini, kriptografi dipilih sebagai teknik untuk mengamankan data, khusunya
data gambar. Teknik kriptografi mempunyai kelebihan yaitu menyamarkan pesan yang …

Information-theoretic cryptography and perfect secrecy

B Zolfaghari, K Bibak - Perfect Secrecy in IoT: A Hybrid Combinatorial …, 2022 - Springer
In this chapter, we first introduce entropy and some basic concepts related to information
theory. We show how entropy has find its way from thermodynamics into information theory …