An effective color image encryption based on Henon map, tent chaotic map, and orthogonal matrices

S Kanwal, S Inam, MTB Othman, A Waqar, M Ibrahim… - Sensors, 2022 - mdpi.com
In the last decade, the communication of images through the internet has increased. Due to
the growing demands for data transfer through images, protection of data and safe …

Generation of key matrix for hill cipher encryption using classical cipher

R Mahendran, K Mani - 2017 World congress on computing …, 2017 - ieeexplore.ieee.org
Hill cipher encryption is the first polygraph cipher in classical encryption. The main drawback
of Hill Cipher is selecting the correct encryption key matrix for encryption. If the encryption …

Iterative sketching for secure coded regression

N Charalambides, H Mahdavifar… - IEEE Journal on …, 2024 - ieeexplore.ieee.org
Linear regression is a fundamental and primitive problem in supervised machine learning,
with applications ranging from epidemiology to finance. In this work, we propose methods for …

Application of Hill Cipher algorithm in securing text messages

APU Siahaan - 2018 - osf.io
Computer security aims to help users prevent fraud or detect fraud in an information-based
system. The information must be secured to be free from threats. Cryptographic techniques …

Generation of high-order random key matrix for Hill Cipher encryption using the modular multiplicative inverse of triangular matrices

Y Chen, R Xie, H Zhang, D Li, W Lin - Wireless Networks, 2024 - Springer
Hill Cipher is one of the classic symmetric encryption algorithms widely used in cloud data
security. Although the hill cipher principle is relatively simple, its key matrix must be …

Modification in Hill Cipher for Cryptographic Application

F Qazi, FH Khan, SA Khan… - 3c Tecnología: glosas …, 2019 - dialnet.unirioja.es
To keep the information, secure from various contenders is an important factor for data
security. For any organization, it is an incredibly important feature to timely transmit secured …

Modified Hill Cipher with Invertible Key Matrix Using Radix 64 Conversion

AA Kumar, S Kiran, DS Reddy - … Proceedings of VICFCNT 2021, Volume 1, 2023 - Springer
Cryptography is one of the most important technological areas which will provide security to
the data by using various cryptographic algorithms. The Hill cipher (HC) is a known …

[PDF][PDF] Enhancing the security of vehicle to road side unit (RSU) communication with key generation and advanced encryption procedure in vehicular ad-hoc network …

F Qazi, FH Khan, KN Kiani… - Indian Journal …, 2017 - sciresol.s3.us-east-2.amazonaws …
Traffic security using vehicle to road side unit communication has thrown many security
challenges that should be overcome in order to achieve the security scenarios. VANET …

Coding Theory and Randomized Sketching for Distributed Optimization

N Charalambides - 2023 - search.proquest.com
With the advent of massive datasets, distributed techniques for processing information and
carrying out computations are expected to enable exceptional possibilities for engineering …

Advance Procedure Of Encryption And Decryption Using Transposition And Substitution

FH Khan, F Qazi - Journal of Information Communication Technologies …, 2018 - jictra.com.pk
It is very important in today's world to protect communication procedure from prying eyes,
and is needed more than ever before. Cryptography plays a major role in mobile …