Výsledky vyhledávání - Authentication and encryption algorithm

Upřesnit hledání
  1. 1

    Image authentication and encryption algorithm based on RSA cryptosystem and chaotic maps Autor Singh, Deep, Kumar, Sandeep

    ISSN: 0957-4174
    Vydáno: Elsevier Ltd 15.05.2025
    Vydáno v Expert systems with applications (15.05.2025)
    “… Therefore, to overcome these security crises, cryptographers need to develop efficient and robust encryption algorithms…”
    Získat plný text
    Journal Article
  2. 2

    Two-phase authentication and encryption algorithm for mobile users Autor Avram, Camelia, Miron, Radu, Radu, Dan, Astilean, Adina

    Vydáno: IEEE 01.05.2018
    “… and corresponding, efficient solutions, applicable for encryption and authentication purposes in an end-to-end information exchange among mobile users…”
    Získat plný text
    Konferenční příspěvek
  3. 3

    ERSS-RLNC: Efficient and robust secure scheme for random linear network coding Autor Noura, Hassan, Martin, Steven, Al Agha, Khaldoun, Chahine, Khaled

    ISSN: 1389-1286, 1872-7069
    Vydáno: Kidlington Elsevier B.V 24.12.2014
    “…–encryption scheme that is immune to Byzantine and eavesdropping attacks. The proposed scheme achieves simultaneously information confidentiality, packet integrity and source authentication with minimum computational complexity and memory consumption…”
    Získat plný text
    Journal Article
  4. 4
  5. 5

    SVD-based image compression, encryption, and identity authentication algorithm on cloud Autor Yu, Changzhi, Li, Hengjian, Wang, Xiyu

    ISSN: 1751-9659, 1751-9667
    Vydáno: The Institution of Engineering and Technology 17.10.2019
    Vydáno v IET image processing (17.10.2019)
    “…Based on singular value decomposition (SVD), an image compression, encryption, and identity authentication scheme is proposed here…”
    Získat plný text
    Journal Article
  6. 6

    Design and implementation of low-cost hardware architecture for authentication encryption algorithm SM4-GCM Autor Rui CHEN, Chunqiang LI

    ISSN: 2096-3750
    Vydáno: China InfoCom Media Group 30.12.2023
    Vydáno v 物联网学报 (30.12.2023)
    “… security.To ensure the security of such data, a cost-effective, multifunctional hardware architecture design based on the Chinese authenticated encryption algorithm SM4-GCM (Galois/Counter Mode…”
    Získat plný text
    Journal Article
  7. 7

    Design and implementation of low-cost hardware architecture for authentication encryption algorithm SM4-GCM Autor Rui CHEN, Chunqiang LI

    ISSN: 2096-3750
    Vydáno: China InfoCom Media Group 01.12.2023
    Vydáno v 物联网学报 (01.12.2023)
    “… security.To ensure the security of such data, a cost-effective, multifunctional hardware architecture design based on the Chinese authenticated encryption algorithm SM4-GCM (Galois/Counter Mode…”
    Získat plný text
    Journal Article
  8. 8

    Color image encryption and authentication algorithm integrating computational ghost imaging with quaternion multi-parameter discrete fractional angular transform Autor Hu, Long-Yan, Guo, Zhe, Gong, Li-Hua

    ISSN: 0957-4174
    Vydáno: Elsevier Ltd 10.03.2026
    Vydáno v Expert systems with applications (10.03.2026)
    “… Given the urgent need for secure and authentic image transmission, a color image encryption and authentication algorithm is designed based on computational ghost imaging (CGI…”
    Získat plný text
    Journal Article
  9. 9

    An optical-based encryption and authentication algorithm for color and grayscale medical images Autor El-Shafai, Walid, Almomani, Iman, Ara, Anees, Alkhayer, Aala

    ISSN: 1380-7501, 1573-7721
    Vydáno: New York Springer US 01.06.2023
    Vydáno v Multimedia tools and applications (01.06.2023)
    “… Therefore, this research was motivated to introduce a more efficient algorithm that achieves several essential security requirements such as authentication, confidentiality, and integrity…”
    Získat plný text
    Journal Article
  10. 10
  11. 11

    Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithm Autor Agrawal, Ruchi, Singhal, Saurabh, Sharma, Ashish

    ISSN: 1386-7857, 1573-7543
    Vydáno: New York Springer US 01.09.2024
    Vydáno v Cluster computing (01.09.2024)
    “… The objective of this study is to develop a blockchain and fog computing model that implements secure data access control mechanisms for distributed data storage and authentication using a hybrid encryption algorithm…”
    Získat plný text
    Journal Article
  12. 12

    A High Throughput and Secure Authentication-Encryption AES-CCM Algorithm on Asynchronous Multicore Processor Autor Pammu, Ali Akbar, Weng-Geng Ho, Ne Kyaw Zwa Lwin, Kwen-Siong Chong, Bah-Hwee Gwee

    ISSN: 1556-6013, 1556-6021
    Vydáno: New York IEEE 01.04.2019
    “…We propose an authentication-based matrix-transformation cum parallel-encryption implemented on an asynchronous multicore processor (AMP-MP…”
    Získat plný text
    Journal Article
  13. 13

    Efficient and Secure Cancelable Biometric Authentication Framework Based on Genetic Encryption Algorithm Autor El-Shafai, Walid, Mohamed, Fatma A. Hossam Eldein, Elkamchouchi, Hassan M. A., Abd-Elnaby, Mohammed, Elshafee, Ahmed

    ISSN: 2169-3536, 2169-3536
    Vydáno: Piscataway IEEE 2021
    Vydáno v IEEE access (2021)
    “… Thus, our main contribution is presenting a novel authentication framework based on the evolutionary Genetic Algorithm (GA…”
    Získat plný text
    Journal Article
  14. 14

    Distributed Identity Authentication with Lenstra–Lenstra–Lovász Algorithm–Ciphertext Policy Attribute-Based Encryption from Lattices: An Efficient Approach Based on Ring Learning with Errors Problem Autor Yuan, Qi, Yuan, Hao, Zhao, Jing, Zhou, Meitong, Shao, Yue, Wang, Yanchun, Zhao, Shuo

    ISSN: 1099-4300, 1099-4300
    Vydáno: Switzerland MDPI AG 27.08.2024
    Vydáno v Entropy (Basel, Switzerland) (27.08.2024)
    “… Because a traditional single authority can cause the potential single point of failure, an improved lattice-based quantum-resistant identity authentication and policy attribute encryption scheme…”
    Získat plný text
    Journal Article
  15. 15

    Security Verification of an Authentication Algorithm Based on Verifiable Encryption Autor Kihara, Maki, Iriyama, Satoshi

    ISSN: 2078-2489, 2078-2489
    Vydáno: Basel MDPI AG 01.02.2023
    Vydáno v Information (01.02.2023)
    “…) As a result of implementing the VE-based authentication algorithm using the one-time pad, the encryption, verification, and decryption processing times are less than 1 ms even with a text length of 8192 bits…”
    Získat plný text
    Journal Article
  16. 16
  17. 17

    A Single-Pass and One-Round Message Authentication Encryption for Limited IoT Devices Autor Noura, Hassan N., Salman, Ola, Couturier, Raphael, Chehab, Ali

    ISSN: 2327-4662, 2327-4662
    Vydáno: Piscataway IEEE 15.09.2022
    Vydáno v IEEE internet of things journal (15.09.2022)
    “…In this work, we propose three efficient variants of a message authentication encryption (MAE…”
    Získat plný text
    Journal Article
  18. 18

    Research on Forgery Attack on Authentication Encryption Algorithm ACE Autor Chang, Lipeng, Wei, Yuechuan, He, Shuiyu, Pan, Xiaozhong

    ISSN: 2693-2865
    Vydáno: IEEE 17.06.2022
    “…The ACE authentication encryption algorithm is an algorithm designed by Aagaard et al…”
    Získat plný text
    Konferenční příspěvek
  19. 19

    ADVANCED TECHNOLOGIES FOR CYBERSECURITY: ENCRYPTION, AUTHENTICATION, AND ANOMALY DETECTION ALGORITHMS Autor Mocean, Loredana, Vlad, Miranda-Petronella

    ISSN: 2285-424X, 2343-8134
    Vydáno: Timisoara Dimitrie Cantemir Christian University, Faculty of Management in Tourism and Commerce Tourism 01.11.2024
    Vydáno v Quaestus (Timio̦ara) (01.11.2024)
    “…In cyber security, algorithms are essential for data protection, user authentication, and access control…”
    Získat plný text
    Journal Article
  20. 20

    Secure data transmission method of end-to-end communication network based on port isolation technology and encryption authentication algorithm Autor Yuan, Chao, Liang, Tian, Li, Roufei, Liu, Wei, Sun, Weijie

    Vydáno: IEEE 12.07.2024
    “… Therefore, a secure transmission method of end-to-end communication network data based on port isolation technology and encryption authentication algorithm is proposed…”
    Získat plný text
    Konferenční příspěvek