Conic curve encryption and digital signature based on complex number theory for cybersecurity applications
Abstract Secure image transmission requires robust algorithms to ensure authentication, integrity, non-repudiation, and confidentiality. Addressing emerging security challenges necessitates continuous advancements in cryptographic design. This paper presents an authenticated and encrypted image sche...
Saved in:
| Main Authors: | Ahmed Kamal, H. A. El-Kamchochi, Adel El-Fahar, Esam A. A. Hagras |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Nature Portfolio
2025-07-01
|
| Series: | Scientific Reports |
| Subjects: | |
| Online Access: | https://doi.org/10.1038/s41598-025-00334-6 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Phase-Image-Encryption-Based Elliptic Curve and Double-Random-Phase Encoding
by: Arabind Kumar, et al.
Published: (2024-01-01) -
On the Application of Noiseless Steganography and Elliptic Curves Cryptography Digital Signature Algorithm Methods in Securing Text Messages
by: Juhari Juhari, et al.
Published: (2022-10-01) -
An anonymous authentication protocol for vehicle to grid based on elliptic curve cryptography
by: Zeyu Sun, et al.
Published: (2025-08-01) -
Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm
by: Sanjay Kumar, et al.
Published: (2023-12-01) -
Efficient and Constant Time Modular Reduction With Generalized Mersenne Primes
by: Serdar S. Erdem, et al.
Published: (2024-01-01)