Suchergebnisse - low computational key encryption algorithm

  1. 1

    Development of a quasi-real-time distribution voltage monitoring system von Sarkar, Subhra J, Sahoo, Sarat Kumar, Kundu, Palash K, Pattanayak, Rutuparna

    ISSN: 1751-8687, 1751-8695
    Veröffentlicht: The Institution of Engineering and Technology 16.10.2020
    Veröffentlicht in IET generation, transmission & distribution (16.10.2020)
    “… A low computational, microcontroller implementable, asymmetric key encryption algorithm similar to Rivest–Shamir …”
    Volltext
    Journal Article
  2. 2

    Key-Free Image Encryption Algorithm Based on Self-Triggered Gaussian Noise Sampling von Gao, Kai, Chang, Chin-Chen, Lin, Chia-Chen

    ISSN: 2169-3536, 2169-3536
    Veröffentlicht: Piscataway IEEE 2024
    Veröffentlicht in IEEE access (2024)
    “… To overcome these problems, in this paper, we propose a key-free image encryption algorithm that offers low computational complexity and high security …”
    Volltext
    Journal Article
  3. 3

    H.264/AVC video encryption algorithm based on integer dynamic cross-coupling tent mapping model von Jin, Wang, Jiandong, Liu, Haoqiang, Xu

    ISSN: 1573-7721, 1380-7501, 1573-7721
    Veröffentlicht: New York Springer US 01.02.2024
    Veröffentlicht in Multimedia tools and applications (01.02.2024)
    “… -dimensional chaos encryption algorithm, this paper uses chaotic pseudo-random sequences generated by the integer dynamic …”
    Volltext
    Journal Article
  4. 4

    A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution von Arif, Jameel, Khan, Muazzam A, Ghaleb, Baraq, Ahmad, Jawad, Munir, Arslan, Rashid, Umer, Al-Dubai, Ahmed

    ISSN: 2169-3536, 2169-3536
    Veröffentlicht: Piscataway IEEE 01.01.2022
    Veröffentlicht in IEEE access (01.01.2022)
    “… However, these algorithms suffer from a low key-space, significant computational overhead, and a lag in resistance against differential attacks …”
    Volltext
    Journal Article
  5. 5

    New Key Generation and Encryption Algorithms for Privacy Preservation in Mobile Ad Hoc Networks von Amiruddin, Amiruddin, Ratna, Anak Agung Putri, Sari, Riri Fitri

    ISSN: 2076-0930, 2073-607X
    Veröffentlicht: 17.04.2022
    “… Our key generation algorithm modified Fibonacci sequence by adding scrambling factors to generate random key sequences with required length but incurred low computational overhead, whereas …”
    Volltext
    Journal Article
  6. 6

    Speech encryption algorithm using FFT and 3D-Lorenz–logistic chaotic map von Sathiyamurthi, P., Ramakrishnan, S.

    ISSN: 1380-7501, 1573-7721
    Veröffentlicht: New York Springer US 01.07.2020
    Veröffentlicht in Multimedia tools and applications (01.07.2020)
    “… In order to improve the drawbacks namely residual intelligibility in encrypted signal, poor quality in decrypted signal, low key space and high computational complexity that prevail in the exist …”
    Volltext
    Journal Article
  7. 7

    Hardware implementation of a strong pseudorandom number generator based block‐cipher system for color image encryption and decryption von Gafsi, Mohamed, Amdouni, Rim, Hajjaji, Mohamed Ali, Mtibaa, Abdellatif, Bourennane, El‐Bey

    ISSN: 0098-9886, 1097-007X
    Veröffentlicht: Bognor Regis Wiley Subscription Services, Inc 01.01.2023
    “… On the other hand, a robust algorithm is proposed to ensure high‐level security and low computational complexity of image encryption …”
    Volltext
    Journal Article
  8. 8

    Quantum Image Encryption Algorithm Based on Quantum Key Image von Wang, Jian, Geng, Ya-Cong, Han, Lei, Liu, Ji-Qiang

    ISSN: 0020-7748, 1572-9575
    Veröffentlicht: New York Springer US 01.01.2019
    Veröffentlicht in International journal of theoretical physics (01.01.2019)
    “… Quantum image encryption is a hot research topic in recent years. In this paper, a novel quantum image encryption algorithm based on quantum key image is presented, which has low complexity than other algorithms …”
    Volltext
    Journal Article
  9. 9

    TFHE: Fast Fully Homomorphic Encryption Over the Torus von Chillotti, Ilaria, Gama, Nicolas, Georgieva, Mariya, Izabachène, Malika

    ISSN: 0933-2790, 1432-1378
    Veröffentlicht: New York Springer US 01.01.2020
    Veröffentlicht in Journal of cryptology (01.01.2020)
    “… This work describes a fast fully homomorphic encryption scheme over the torus (TFHE) that revisits, generalizes and improves the fully homomorphic encryption …”
    Volltext
    Journal Article
  10. 10

    New Key Generation and Encryption Algorithms for Privacy Preservation in Mobile Ad Hoc Networks von Amiruddin, Ratna, Anak Agung Putri, Sari, Riri Fitri

    ISSN: 2073-607X, 2076-0930
    Veröffentlicht: Kohat Kohat University of Science and Technology (KUST) 01.12.2017
    “… Our key generation algorithm modified Fibonacci sequence by adding scrambling factors to generate random key sequences with required length but incurred low computational overhead, whereas …”
    Volltext
    Journal Article
  11. 11

    Low Rank Parity Check Codes: New Decoding Algorithms and Applications to Cryptography von Aragon, Nicolas, Gaborit, Philippe, Hauteville, Adrien, Ruatta, Olivier, Zemor, Gilles

    ISSN: 0018-9448, 1557-9654
    Veröffentlicht: New York IEEE 01.12.2019
    Veröffentlicht in IEEE transactions on information theory (01.12.2019)
    “… ) and public key encryption (PKE). Unlike rank metric codes used in previous encryption algorithms -notably Gabidulin codes - LRPC codes have a very weak algebraic structure …”
    Volltext
    Journal Article
  12. 12

    Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions von Singh, Saurabh, Sharma, Pradip Kumar, Moon, Seo Yeon, Park, Jong Hyuk

    ISSN: 1868-5137, 1868-5145
    Veröffentlicht: Berlin/Heidelberg Springer Berlin Heidelberg 01.02.2024
    “… Nowadays, Internet of Things (IoT) enables many low resources and constrained devices to communicate, compute process and make decision in the communication network …”
    Volltext
    Journal Article
  13. 13

    Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map von Li, Jianhua, Liu, Hui

    ISSN: 1751-8709, 1751-8717
    Veröffentlicht: Stevenage The Institution of Engineering and Technology 01.12.2013
    Veröffentlicht in IET information security (01.12.2013)
    “… In this study, a novel scheme of advanced encryption standard (AES) is proposed. Its independent round key is generated by the two-dimensional (2D …”
    Volltext
    Journal Article
  14. 14

    Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange von Derler, David, Gellert, Kai, Jager, Tibor, Slamanig, Daniel, Striecks, Christoph

    ISSN: 0933-2790, 1432-1378
    Veröffentlicht: New York Springer US 01.04.2021
    Veröffentlicht in Journal of cryptology (01.04.2021)
    “… Forward secrecy is considered an essential design goal of modern key establishment (KE …”
    Volltext
    Journal Article
  15. 15

    A novel parallel image encryption algorithm based on hybrid chaotic maps with OpenCL implementation von You, Lin, Yang, Ersong, Wang, Guangyi

    ISSN: 1432-7643, 1433-7479
    Veröffentlicht: Berlin/Heidelberg Springer Berlin Heidelberg 01.08.2020
    Veröffentlicht in Soft computing (Berlin, Germany) (01.08.2020)
    “… But some existing image encryption algorithms were proved that their security, encryption efficiency or computational speeds are not quite satisfactory for practical applications …”
    Volltext
    Journal Article
  16. 16

    An Efficient Image Encryption Algorithm Based on Innovative DES Structure and Hyperchaotic Keys von Li, Shih-Yu, Gai, Yanwen, Shih, Kai-Chung, Chen, Chin-Sheng

    ISSN: 1549-8328, 1558-0806
    Veröffentlicht: New York IEEE 01.10.2023
    “… In fact, as a traditional encryption method, DES has been certified as an unsuitable tool for ciphering due to its smaller key space …”
    Volltext
    Journal Article
  17. 17

    Incremental Deterministic Public-Key Encryption von Mironov, Ilya, Pandey, Omkant, Reingold, Omer, Segev, Gil

    ISSN: 0933-2790, 1432-1378
    Veröffentlicht: New York Springer US 01.01.2018
    Veröffentlicht in Journal of cryptology (01.01.2018)
    “… A deterministic encryption algorithm, however, cannot satisfy any meaningful notion of security for low-entropy plaintexts distributions, but Bellare et al …”
    Volltext
    Journal Article
  18. 18

    A Hierarchical Encryption and Key Management Scheme for Layered Access Control on H.264/SVC Bitstream in the Internet of Things von Xu, Cheng, Ren, Wei, Yu, Linchen, Zhu, Tianqing, Choo, Kim-Kwang Raymond

    ISSN: 2327-4662, 2327-4662
    Veröffentlicht: Piscataway IEEE 01.09.2020
    Veröffentlicht in IEEE internet of things journal (01.09.2020)
    “… ), there has been increased scrutiny on security of H.264/SVC. In this article, we propose a bitstream-oriented layered encryption scheme for SVC bitstream …”
    Volltext
    Journal Article
  19. 19

    Image encryption algorithm based on factorial decomposition von AlShaikh, Muath, Alzaqebah, Malek, Gmati, Nabil, Alrefai, Nashat, Alsmadi, Mutasem K., Almarashdeh, Ibrahim, Mohammad, Rami Mustafa A., Alamri, Sultan, Kara, Mostefa

    ISSN: 1573-7721, 1380-7501, 1573-7721
    Veröffentlicht: New York Springer US 01.12.2024
    Veröffentlicht in Multimedia tools and applications (01.12.2024)
    “… This study proposes a highly efficient image encryption algorithm by employing a rapid key generation approach and permutation structure …”
    Volltext
    Journal Article
  20. 20

    Image Encryption Algorithm Based on Adaptive Wavelet Chaos von An, Feng-Ping, Liu, Jun-e

    ISSN: 1687-725X, 1687-7268
    Veröffentlicht: Cairo, Egypt Hindawi Publishing Corporation 2019
    Veröffentlicht in Journal of sensors (2019)
    “… Early image encryption technologies have shortcomings such as simple algorithm structure, small key space, and poor resistance to plaintext attacks …”
    Volltext
    Journal Article