You are currently on the new version of our website. Access the old version .

391 Results Found

  • Article
  • Open Access
2 Citations
3,688 Views
11 Pages

Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring

  • Muzna Yumman,
  • Tariq Shah and
  • Iqtadar Hussain

30 December 2020

The revolutionary idea of asymmetric cryptography brings a fundamental change to our modern communication system. However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and dis...

  • Article
  • Open Access
3 Citations
2,043 Views
22 Pages

On the Cryptanalysis of a Latin Cubes-Based Image Cryptosystem

  • Rong Huang,
  • Hao Liu,
  • Xiaojuan Liao and
  • Aihua Dong

7 February 2021

Based on orthogonal Latin cubes, an image cryptosystem with confusion–diffusion–confusion cipher architecture has been proposed recently (Inf. Sci.2019, 478, 1–14). However, we find that there are four fatal vulnerabilities in this image cryptosystem...

  • Article
  • Open Access
1,927 Views
9 Pages

Security Analysis of DBTRU Cryptosystem

  • Xiaofei Tong,
  • Jingguo Bi,
  • Yufei Duan,
  • Lixiang Li and
  • Licheng Wang

23 September 2022

DBTRU was proposed by Thang and Binh in 2015. As a variant of NTRU, the integer polynomial ring is replaced by two binary truncated polynomial rings GF(2)[x]/(xn+1). DBTRU has some advantages over NTRU in terms of security and performance. In this pa...

  • Article
  • Open Access
26 Citations
4,705 Views
12 Pages

A Novel Fingerprint Biometric Cryptosystem Based on Convolutional Neural Networks

  • Srđan Barzut,
  • Milan Milosavljević,
  • Saša Adamović,
  • Muzafer Saračević,
  • Nemanja Maček and
  • Milan Gnjatović

28 March 2021

Modern access controls employ biometrics as a means of authentication to a great extent. For example, biometrics is used as an authentication mechanism implemented on commercial devices such as smartphones and laptops. This paper presents a fingerpri...

  • Article
  • Open Access
28 Citations
7,139 Views
28 Pages

Implementing a Chaotic Cryptosystem by Performing Parallel Computing on Embedded Systems with Multiprocessors

  • Abraham Flores-Vergara,
  • Everardo Inzunza-González,
  • Enrique Efren García-Guerrero,
  • Oscar Roberto López-Bonilla,
  • Eduardo Rodríguez-Orozco,
  • Juan Miguel Hernández-Ontiveros,
  • José Ricardo Cárdenas-Valdez and
  • Esteban Tlelo-Cuautle

9 March 2019

Profiling and parallel computing techniques in a cluster of six embedded systems with multiprocessors are introduced herein to implement a chaotic cryptosystem for digital color images. The proposed encryption method is based on stream encryption usi...

  • Article
  • Open Access
55 Citations
6,789 Views
16 Pages

FPGA-based Chaotic Cryptosystem by Using Voice Recognition as Access Key

  • Eduardo Rodríguez-Orozco,
  • Enrique Efren García-Guerrero,
  • Everardo Inzunza-Gonzalez,
  • Oscar Roberto López-Bonilla,
  • Abraham Flores-Vergara,
  • Jose Ricardo Cárdenas-Valdez and
  • Esteban Tlelo-Cuautle

A new embedded chaotic cryptosystem is introduced herein with the aim to encrypt digital images and performing speech recognition as an external access key. The proposed cryptosystem consists of three technologies: (i) a Spartan 3E-1600 FPGA from Xil...

  • Article
  • Open Access
18 Citations
3,296 Views
13 Pages

1 July 2019

This paper is concerned with the design of an improved El-Gamal cryptosystem based on chaos synchronization. The El-Gamal cryptosystem is an asymmetric encryption algorithm that must use the public and private keys, respectively, in the encryption an...

  • Article
  • Open Access
12 Citations
5,289 Views
14 Pages

A New Class of Q-Ary Codes for the McEliece Cryptosystem

  • Jürgen Freudenberger and
  • Johann-Philipp Thiers

The McEliece cryptosystem is a promising candidate for post-quantum public-key encryption. In this work, we propose q-ary codes over Gaussian integers for the McEliece system and a new channel model. With this one Mannheim error channel, errors are l...

  • Proceeding Paper
  • Open Access
2 Citations
1,114 Views
3 Pages

An Asymmetric Optical Cryptosystem Using Physically Unclonable Functions in the Fresnel Domain

  • Vinny Cris Mandapati,
  • Shashi Prabhakar,
  • Harsh Vardhan,
  • Ravi Kumar,
  • Salla Gangi Reddy,
  • Sakshi and
  • Ravindra P. Singh

6 March 2023

In this paper, we propose a new asymmetric cryptosystem for phase image encryption, using the physically unclonable functions (PUFs) as security keys. For encryption, the original amplitude image is first converted into a phase image and modulated wi...

  • Article
  • Open Access
4 Citations
1,773 Views
21 Pages

23 April 2024

Aiming at addressing the security and efficiency challenges during image transmission, an efficient image cryptosystem utilizing difference matrix and genetic algorithm is proposed in this paper. A difference matrix is a typical combinatorial structu...

  • Article
  • Open Access
10 Citations
2,788 Views
17 Pages

Multimedia Cryptosystem for IoT Applications Based on a Novel Chaotic System around a Predefined Manifold

  • Li Li,
  • Ahmed A. Abd El-Latif,
  • Sajad Jafari,
  • Karthikeyan Rajagopal,
  • Fahimeh Nazarimehr and
  • Bassem Abd-El-Atty

3 January 2022

Multimedia data play an important role in our daily lives. The evolution of internet technologies means that multimedia data can easily participate amongst various users for specific purposes, in which multimedia data confidentiality and integrity ha...

  • Article
  • Open Access
4,021 Views
25 Pages

NTRU-Like Random Congruential Public-Key Cryptosystem for Wireless Sensor Networks

  • Anas Ibrahim,
  • Alexander Chefranov,
  • Nagham Hamad,
  • Yousef-Awwad Daraghmi,
  • Ahmad Al-Khasawneh and
  • Joel J. P. C. Rodrigues

17 August 2020

Wireless sensor networks (WSNs) are the core of the Internet of Things and require cryptographic protection. Cryptographic methods for WSN should be fast and consume low power as these networks rely on battery-powered devices and microcontrollers. NT...

  • Article
  • Open Access
6 Citations
2,114 Views
20 Pages

A Novel Signature and Authentication Cryptosystem for Hyperspectral Image by Using Triangular Association Encryption Algorithm in Gyrator Domains

  • Zhonglin Yang,
  • Yanhua Cao,
  • Shutian Liu,
  • Camel Tanougast,
  • Walter Blondel,
  • Zhengjun Liu and
  • Hang Chen

29 July 2022

A novel optical signature and authentication cryptosystem is proposed by applying triangular association encryption algorithm (TAEA) and 3D Arnold transform in Gyrator domains. Firstly, a triangular association encryption algorithm (TAEA) is designed...

  • Article
  • Open Access
902 Views
22 Pages

Multi-Layer Cryptosystem Using Reversible Cellular Automata

  • George Cosmin Stănică and
  • Petre Anghelescu

The growing need for adaptable and efficient hardware-based encryption methods has led to increased interest in unconventional models such as cellular automata (CA). This study presents the hardware design and the field programmable gate array (FPGA)...

  • Article
  • Open Access
5 Citations
4,182 Views
15 Pages

Biometrics-Based RSA Cryptosystem for Securing Real-Time Communication

  • Xiaolong Liu,
  • Wei-Bin Lee,
  • Quy-Anh Bui,
  • Chia-Chen Lin and
  • Hsiao-Ling Wu

9 October 2018

Real-time online communication technology has become increasingly important in modern business applications. It allows people to easily connect with business partners over the Internet through the camera lens on digital devices. However, despite the...

  • Article
  • Open Access
472 Views
43 Pages

Secure DNA Cryptosystem for Data Protection in Cloud Storage and Retrieval

  • Thangavel Murugan,
  • Varalakshmi Perumal and
  • Nasurudeen Ahamed Noor Mohamed Badusha

10 December 2025

In today’s digital era, real-time applications rely heavily on cloud environments for computation, storage, and data retrieval. Data owners outsource sensitive information to cloud storage servers managed by service providers such as Google and...

  • Article
  • Open Access
3 Citations
2,702 Views
25 Pages

20 September 2023

With the rapid development of Internet of Things technology and cloud computing technology, all industries need to outsource massive data to third-party clouds for storage in order to reduce storage and computing costs. Verifiable and dynamic searcha...

  • Article
  • Open Access
92 Citations
5,749 Views
17 Pages

14 December 2016

Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of e...

  • Article
  • Open Access
9 Citations
3,137 Views
14 Pages

A Robust and Hybrid Cryptosystem for Identity Authentication

  • Ali Takieldeen,
  • Said H. Abd Elkhalik,
  • Ahmed S. Samra,
  • Mohamed A. Mohamed and
  • Fahmi Khalifa

1 March 2021

With the progressive development of a wide range of applications, interconnect things and internet of things (IoT) became an imperative required trend by industries and academicians. IoT became a base infrastructure for remote access or control depen...

  • Article
  • Open Access
3 Citations
2,702 Views
9 Pages

1 April 2022

Error-correcting codes form an important topic in information theory. They are used to correct errors that occur during transmission on a noisy channel. An important method for correcting errors is bounded distance decoding. The public-key cryptosyst...

  • Review
  • Open Access
18 Citations
5,656 Views
18 Pages

27 July 2022

Cryptography is the study and practice of secure communication with digital data and focuses on confidentiality, integrity, and authentication. Random number generators (RNGs) generate random numbers to enhance security. Even though the cryptographic...

  • Review
  • Open Access
1 Citations
2,949 Views
43 Pages

Unfolding Post-Quantum Cryptosystems: CRYSTALS-Dilithium, McEliece, BIKE, and HQC

  • Vaghawan Prasad Ojha,
  • Sumit Chauhan,
  • Shantia Yarahmadian and
  • David Carvalho

3 September 2025

The advent of quantum computers poses a significant threat to the security of classical cryptographic systems. To address this concern, researchers have been actively investigating the development of post-quantum cryptography, which aims to provide e...

  • Article
  • Open Access
3 Citations
9,151 Views
23 Pages

Learning Global-Local Distance Metrics for Signature-Based Biometric Cryptosystems

  • George S. Eskander Ekladious,
  • Robert Sabourin and
  • Eric Granger

Biometric traits, such as fingerprints, faces and signatures have been employed in bio-cryptosystems to secure cryptographic keys within digital security schemes. Reliable implementations of these systems employ error correction codes formulated as s...

  • Article
  • Open Access
3 Citations
2,125 Views
22 Pages

Security Analysis of the Symmetric Cryptosystem TinyJambu

  • Amparo Fúster-Sabater and
  • M. E. Pazo-Robles

5 April 2024

Symmetric cryptography provides the best examples of cryptosystems to be applied in lightweight environments (e.g., IoT). A representative example is the cryptosystem TinyJambu, one of the ten finalists in the NIST Lightweight Cryptography Standardiz...

  • Feature Paper
  • Article
  • Open Access
1 Citations
658 Views
44 Pages

Secure Chaotic Cryptosystem for 3D Medical Images

  • Antonios S. Andreatos and
  • Apostolos P. Leros

16 October 2025

This study proposes a lightweight double-encryption cryptosystem for 3D medical images such as Magnetic Resonance Imaging (MRI), Positron Emission Tomography (PET) scans, and Computed Tomography scans (CT). The first encryption process uses chaotic p...

  • Review
  • Open Access
21 Citations
4,740 Views
41 Pages

12 January 2023

Optical correlators are efficient optical systems that have gained a wide range of applications both in image recognition and encryption, due to their special properties that benefit from the optoelectronic setup instead of an all-electronic one. Thi...

  • Article
  • Open Access
3 Citations
2,367 Views
16 Pages

Modified SHARK Cipher and Duffing Map-Based Cryptosystem

  • Osama Rabie,
  • Jawad Ahmad and
  • Daniyal Alghazzawi

12 June 2022

Recent years have seen a lot of interest in the study of chaotic structures and their accompanying cryptography frameworks. In this research, we came up with a new way to encrypt images that used the chaos and a modified block cipher named the SHARK...

  • Article
  • Open Access
14 Citations
8,525 Views
25 Pages

Evaluation and Comparison of Lattice-Based Cryptosystems for a Secure Quantum Computing Era

  • Maria E. Sabani,
  • Ilias K. Savvas,
  • Dimitrios Poulakis,
  • Georgia Garani and
  • Georgios C. Makris

The rapid development of quantum computing devices promises powerful machines with the potential to confront a variety of problems that conventional computers cannot. Therefore, quantum computers generate new threats at unprecedented speed and scale...

  • Article
  • Open Access
4 Citations
2,907 Views
24 Pages

A Hybrid Cryptosystem Incorporating a New Algorithm for Improved Entropy

  • Víctor Manuel Silva-García,
  • Rolando Flores-Carapia and
  • Manuel Alejandro Cardona-López

10 February 2024

Today, safeguarding sensitive content through encryption is crucial. This work presents a hybrid cryptosystem for images that employs both asymmetric and symmetric encryption. The asymmetric component involves applying the Diffie–Hellman protoc...

  • Article
  • Open Access
2 Citations
1,856 Views
33 Pages

29 October 2024

The RSA cryptosystem has been a cornerstone of modern public key infrastructure; however, recent advancements in quantum computing and theoretical mathematics pose significant risks to its security. The advent of fully operational quantum computers c...

  • Article
  • Open Access
3 Citations
3,828 Views
29 Pages

In recent years, several new notions of security have begun receiving consideration for public-key cryptosystems, beyond the standard of security against adaptive chosen ciphertext attack (CCA2). Among these are security against randomness reset atta...

  • Article
  • Open Access
16 Citations
4,117 Views
20 Pages

A Novel and Secure Fake-Modulus Based Rabin-Ӡ Cryptosystem

  • Raghunandan Kemmannu Ramesh,
  • Radhakrishna Dodmane,
  • Surendra Shetty,
  • Ganesh Aithal,
  • Monalisa Sahu and
  • Aditya Kumar Sahu

Electronic commerce (E-commerce) transactions require secure communication to protect sensitive information such as credit card numbers, personal identification, and financial data from unauthorized access and fraud. Encryption using public key crypt...

  • Review
  • Open Access
1 Citations
2,777 Views
24 Pages

Review of Modular Multiplication Algorithms over Prime Fields for Public-Key Cryptosystems

  • Hai Huang,
  • Jiwen Zheng,
  • Zhengyu Chen,
  • Shilei Zhao,
  • Hongwei Wu,
  • Bin Yu and
  • Zhiwei Liu

Modular multiplication is a pivotal operation in public-key cryptosystems such as RSA, ElGamal, and ECC. Modular multiplication design is crucial for improving overall system performance due to the large-bit-width operation with high computational co...

  • Article
  • Open Access
12 Citations
2,052 Views
27 Pages

A Lightweight Image Cryptosystem for Cloud-Assisted Internet of Things

  • Esau Taiwo Oladipupo,
  • Oluwakemi Christiana Abikoye and
  • Joseph Bamidele Awotunde

27 March 2024

Cloud computing and the increasing popularity of 5G have greatly increased the application of images on Internet of Things (IoT) devices. The storage of images on an untrusted cloud has high security and privacy risks. Several lightweight cryptosyste...

  • Article
  • Open Access
6 Citations
2,157 Views
20 Pages

Reversible Cellular Automata Based Cryptosystem

  • George Cosmin Stănică and
  • Petre Anghelescu

The increasing reliance on telecommunication technologies across various domains has raised concerns surrounding data security and privacy during transmission. In response to these concerns, this study introduces a different approach to cryptographic...

  • Article
  • Open Access
1,450 Views
17 Pages

24 January 2024

In this paper, we propose an asymmetric cryptosystem based on dynamic foveated imaging and bidimensional empirical mode decomposition (BEMD). Firstly, a novel dynamic foveated imaging algorithm is developed to transform a plaintext image to a globall...

  • Article
  • Open Access
5 Citations
2,083 Views
15 Pages

In this paper, we study the effect of using small prime numbers within the Joye–Libert public key encryption scheme. We introduce two novel versions and prove their security. We further show how to choose the system’s parameters such that...

  • Article
  • Open Access
1 Citations
2,309 Views
22 Pages

As an essential cryptological element, symmetric-key block ciphers have long been utilized to offer information security. Even though they were created to provide data confidentiality, their adaptability grants them to be utilized in the creation of...

  • Article
  • Open Access
10 Citations
2,344 Views
22 Pages

A Dynamic Hybrid Cryptosystem Using Chaos and Diffie–Hellman Protocol: An Image Encryption Application

  • Rolando Flores-Carapia,
  • Víctor Manuel Silva-García and
  • Manuel Alejandro Cardona-López

15 June 2023

Images with sensitive content require encryption for storage and transmission. Symmetric schemes can cipher them, while an asymmetric cryptosystem can distribute the secret key safely. For this reason, we propose a dynamic hybrid cryptosystem, which...

  • Article
  • Open Access
10 Citations
8,846 Views
13 Pages

Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor Networks

  • Xianfeng Guo,
  • Jiashu Zhang,
  • Muhammad Khurram Khan and
  • Khaled Alghathbar

27 January 2011

Recently, Wang et al. presented an efficient logistic map based block encryption system. The encryption system employs feedback ciphertext to achieve plaintext dependence of sub-keys. Unfortunately, we discovered that their scheme is unable to withst...

  • Article
  • Open Access
15 Citations
2,181 Views
12 Pages

Multi-User Nonlinear Optical Cryptosystem Based on Polar Decomposition and Fractional Vortex Speckle Patterns

  • Vinny Cris Mandapati,
  • Harsh Vardhan,
  • Shashi Prabhakar,
  • Sakshi,
  • Ravi Kumar,
  • Salla Gangi Reddy,
  • Ravindra P. Singh and
  • Kehar Singh

In this paper, we propose a new multiuser nonlinear optical cryptosystem using fractional-order vortex speckle (FOVS) patterns as security keys. In conventional optical cryptosystems, mostly random phase masks are used as the security keys which are...

  • Feature Paper
  • Article
  • Open Access
3 Citations
4,973 Views
33 Pages

A Supersymmetry and Quantum Cryptosystem with Path Integral Approach in Biology

  • Salvatore Capozziello,
  • Richard Pinčák and
  • Erik Bartoš

24 July 2020

The source of cancerous mutations and the relationship to telomeres is explained in an alternative way. We define the smallest subunit in the genetic code as a loop braid group element. The loop braid group is suitable to be defined as a configuratio...

  • Article
  • Open Access
1 Citations
893 Views
17 Pages

19 June 2025

In this paper, we propose a secure homomorphic K-means clustering protocol based on the Paillier cryptosystem to address the urgent need for privacy-preserving clustering techniques in sensitive domains such as healthcare and finance. The protocol us...

  • Article
  • Open Access
83 Citations
6,286 Views
20 Pages

Implementing a Symmetric Lightweight Cryptosystem in Highly Constrained IoT Devices by Using a Chaotic S-Box

  • Badr M. Alshammari,
  • Ramzi Guesmi,
  • Tawfik Guesmi,
  • Haitham Alsaif and
  • Ahmed Alzamil

13 January 2021

In the Internet of Things (IoT), a lot of constrained devices are interconnected. The data collected from those devices can be the target of cyberattacks. In this paper, a lightweight cryptosystem that can be efficiently implemented in highly constra...

  • Article
  • Open Access
4 Citations
3,744 Views
27 Pages

PKCHD: Towards a Probabilistic Knapsack Public-Key Cryptosystem with High Density

  • Yuan Ping,
  • Baocang Wang,
  • Shengli Tian,
  • Jingxian Zhou and
  • Hui Ma

21 February 2019

By introducing an easy knapsack-type problem, a probabilistic knapsack-type public key cryptosystem (PKCHD) is proposed. It uses a Chinese remainder theorem to disguise the easy knapsack sequence. Thence, to recover the trapdoor information, the impl...

  • Article
  • Open Access
3,341 Views
23 Pages

Design and Validation of Low-Power Secure and Dependable Elliptic Curve Cryptosystem

  • Bikash Poudel,
  • Arslan Munir,
  • Joonho Kong and
  • Muazzam A. Khan

The elliptic curve cryptosystem (ECC) has been proven to be vulnerable to non-invasive side-channel analysis attacks, such as timing, power, visible light, electromagnetic emanation, and acoustic analysis attacks. In ECC, the scalar multiplication co...

  • Article
  • Open Access
6 Citations
1,708 Views
17 Pages

The emergence of new embedded system technologies, such as IoT, requires the design of new lightweight cryptosystems to meet different hardware restrictions. In this context, the concept of Finite State Machines (FSMs) can offer a robust solution whe...

  • Article
  • Open Access
2 Citations
2,831 Views
15 Pages

An Enhanced Learning with Error-Based Cryptosystem: A Lightweight Quantum-Secure Cryptography Method

  • Mostefa Kara,
  • Konstantinos Karampidis,
  • Giorgos Papadourakis,
  • Mohammad Hammoudeh and
  • Muath AlShaikh

13 October 2024

Quantum-secure cryptography is a dynamic field due to its crucial role in various domains. This field aligns with the ongoing efforts in data security. Post-quantum encryption (PQE) aims to counter the threats posed by future quantum computers, highl...

  • Article
  • Open Access
14 Citations
2,790 Views
30 Pages

Efficient Colour Image Encryption Algorithm Using a New Fractional-Order Memcapacitive Hyperchaotic System

  • Zain-Aldeen S. A. Rahman,
  • Basil H. Jasim,
  • Yasir I. A. Al-Yasir and
  • Raed A. Abd-Alhameed

In comparison with integer-order chaotic systems, fractional-order chaotic systems exhibit more complex dynamics. In recent years, research into fractional chaotic systems for the utilization of image cryptosystems has become increasingly highlighted...

  • Article
  • Open Access
6 Citations
2,039 Views
21 Pages

On a Symmetric Image Cryptosystem Based on a Novel One-Dimensional Chaotic System and Banyan Network

  • Qingye Huang,
  • Linqing Huang,
  • Shuting Cai,
  • Xiaoming Xiong and
  • Hui Zhang

24 October 2023

In this paper, a Banyan network with high parallelism and nonlinearity is used for the first time in image encryption to ensure high complexity and randomness in a cipher image. To begin, we propose a new 1-D chaotic system (1-DSCM) which improves th...

of 8