Conic curve encryption and digital signature based on complex number theory for cybersecurity applications

Abstract Secure image transmission requires robust algorithms to ensure authentication, integrity, non-repudiation, and confidentiality. Addressing emerging security challenges necessitates continuous advancements in cryptographic design. This paper presents an authenticated and encrypted image sche...

Full description

Saved in:
Bibliographic Details
Main Authors: Ahmed Kamal, H. A. El-Kamchochi, Adel El-Fahar, Esam A. A. Hagras
Format: Article
Language:English
Published: Nature Portfolio 2025-07-01
Series:Scientific Reports
Subjects:
Online Access:https://doi.org/10.1038/s41598-025-00334-6
Tags: Add Tag
No Tags, Be the first to tag this record!