A novel image encryption scheme based on elliptic curves and coupled map lattices

NA Azam, G Murtaza, U Hayat - Optik, 2023 - Elsevier
The security of digital images has become the main concern due to the rapid rise in the
sharing of data over the Internet and open networks. Recently many image cryptosystems …

Secured Vital Parameter Monitoring and Seamless Instant Alert System for Health Care Services

G Supraja, J Kruthika, G Vijayakumari… - … on Networking and …, 2023 - ieeexplore.ieee.org
Monitoring Vital signs indicate the status of patient's life threatening in both acute and
intensive critical care units. The main objective of this work is to prevent a progressive …

A Survey on Cryptography.

N Sarika, SY Sai, TN Devi, TM Palwadi… - … of Engineering & …, 2024 - search.ebscohost.com
This survey presents a comprehensive examination of diverse encryption and decryption
techniques, encompassing historical methods like DES to modern approaches such as …

Key Generation: Encryption and Decryption Using Triangular Cubical Approach for Blockchain in the 6G Network and Cloud Environment

S Kumar, N Kumar - Blockchain for 6G-Enabled Network …, 2022 - api.taylorfrancis.com
This section presents the cryptosystem for the blockchain in 6G networks and cloud
computing, as well as the motivation for and contribution of the key generation mechanism …

[PDF][PDF] Improved RC6 algorithm using two types of chaos maps

ZTM Al-Ta'i, E Jumaa - Int J Eng Adv Technol, 2019 - researchgate.net
RC6 (Rivest cipher 6) is keyblock chipher which consider symmetric imitative from RC5. It
was intended to encounter the needs competition of the Advanced Encryption Standard …

Implementation of Krouswa Desmedt Multichiper Algorithm in ECC Processor

C Lakshmi, PJ Jayarin - 2019 Fifth International Conference on …, 2019 - ieeexplore.ieee.org
The key role of cryptography algorithm plays the important role in Network security. The
conventional cryptography algorithm such as AES, RSA uses the specific encryption and …

[引用][C] Elliptic Curve Cryptography for Data Security

MM Islam, MM Alam, MF Ahmed, M Shahjalal… - 한국통신학회학술대회 …, 2019 - dbpia.co.kr
The importance of information and communication systems is growing rapidly with the
increasing number of data which is transmitted and stored on those systems. At the same …

[引用][C] Encryption and Decryption using Elliptic Curve Cryptography for IoT Security

MM Islam, MZ Chowdhury, MK Hasan… - 한국통신학회학술대회 …, 2019 - dbpia.co.kr
The importance of information and communication systems is growing rapidly with the
increasing number of data which is transmitted and stored on those systems. At the same …

[引用][C] Course Project

N CHAKRABORTY