Search Results - low computational key encryption algorithm
-
1
Development of a quasi-real-time distribution voltage monitoring system
ISSN: 1751-8687, 1751-8695Published: The Institution of Engineering and Technology 16.10.2020Published in IET generation, transmission & distribution (16.10.2020)“… A low computational, microcontroller implementable, asymmetric key encryption algorithm similar to Rivest–Shamir…”
Get full text
Journal Article -
2
Key-Free Image Encryption Algorithm Based on Self-Triggered Gaussian Noise Sampling
ISSN: 2169-3536, 2169-3536Published: Piscataway IEEE 2024Published in IEEE access (2024)“… To overcome these problems, in this paper, we propose a key-free image encryption algorithm that offers low computational complexity and high security…”
Get full text
Journal Article -
3
H.264/AVC video encryption algorithm based on integer dynamic cross-coupling tent mapping model
ISSN: 1573-7721, 1380-7501, 1573-7721Published: New York Springer US 01.02.2024Published in Multimedia tools and applications (01.02.2024)“…-dimensional chaos encryption algorithm, this paper uses chaotic pseudo-random sequences generated by the integer dynamic…”
Get full text
Journal Article -
4
A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution
ISSN: 2169-3536, 2169-3536Published: Piscataway IEEE 01.01.2022Published in IEEE access (01.01.2022)“… However, these algorithms suffer from a low key-space, significant computational overhead, and a lag in resistance against differential attacks…”
Get full text
Journal Article -
5
New Key Generation and Encryption Algorithms for Privacy Preservation in Mobile Ad Hoc Networks
ISSN: 2076-0930, 2073-607XPublished: 17.04.2022Published in International journal of communication networks and information security (17.04.2022)“… Our key generation algorithm modified Fibonacci sequence by adding scrambling factors to generate random key sequences with required length but incurred low computational overhead, whereas…”
Get full text
Journal Article -
6
Speech encryption algorithm using FFT and 3D-Lorenz–logistic chaotic map
ISSN: 1380-7501, 1573-7721Published: New York Springer US 01.07.2020Published in Multimedia tools and applications (01.07.2020)“… In order to improve the drawbacks namely residual intelligibility in encrypted signal, poor quality in decrypted signal, low key space and high computational complexity that prevail in the exist…”
Get full text
Journal Article -
7
Hardware implementation of a strong pseudorandom number generator based block‐cipher system for color image encryption and decryption
ISSN: 0098-9886, 1097-007XPublished: Bognor Regis Wiley Subscription Services, Inc 01.01.2023Published in International journal of circuit theory and applications (01.01.2023)“… On the other hand, a robust algorithm is proposed to ensure high‐level security and low computational complexity of image encryption…”
Get full text
Journal Article -
8
Quantum Image Encryption Algorithm Based on Quantum Key Image
ISSN: 0020-7748, 1572-9575Published: New York Springer US 01.01.2019Published in International journal of theoretical physics (01.01.2019)“…Quantum image encryption is a hot research topic in recent years. In this paper, a novel quantum image encryption algorithm based on quantum key image is presented, which has low complexity than other algorithms…”
Get full text
Journal Article -
9
TFHE: Fast Fully Homomorphic Encryption Over the Torus
ISSN: 0933-2790, 1432-1378Published: New York Springer US 01.01.2020Published in Journal of cryptology (01.01.2020)“…This work describes a fast fully homomorphic encryption scheme over the torus (TFHE) that revisits, generalizes and improves the fully homomorphic encryption…”
Get full text
Journal Article -
10
New Key Generation and Encryption Algorithms for Privacy Preservation in Mobile Ad Hoc Networks
ISSN: 2073-607X, 2076-0930Published: Kohat Kohat University of Science and Technology (KUST) 01.12.2017Published in International journal of communication networks and information security (01.12.2017)“… Our key generation algorithm modified Fibonacci sequence by adding scrambling factors to generate random key sequences with required length but incurred low computational overhead, whereas…”
Get full text
Journal Article -
11
Low Rank Parity Check Codes: New Decoding Algorithms and Applications to Cryptography
ISSN: 0018-9448, 1557-9654Published: New York IEEE 01.12.2019Published in IEEE transactions on information theory (01.12.2019)“…) and public key encryption (PKE). Unlike rank metric codes used in previous encryption algorithms -notably Gabidulin codes - LRPC codes have a very weak algebraic structure…”
Get full text
Journal Article -
12
Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions
ISSN: 1868-5137, 1868-5145Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.02.2024Published in Journal of ambient intelligence and humanized computing (01.02.2024)“… Nowadays, Internet of Things (IoT) enables many low resources and constrained devices to communicate, compute process and make decision in the communication network…”
Get full text
Journal Article -
13
Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map
ISSN: 1751-8709, 1751-8717Published: Stevenage The Institution of Engineering and Technology 01.12.2013Published in IET information security (01.12.2013)“…In this study, a novel scheme of advanced encryption standard (AES) is proposed. Its independent round key is generated by the two-dimensional (2D…”
Get full text
Journal Article -
14
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
ISSN: 0933-2790, 1432-1378Published: New York Springer US 01.04.2021Published in Journal of cryptology (01.04.2021)“…Forward secrecy is considered an essential design goal of modern key establishment (KE…”
Get full text
Journal Article -
15
A novel parallel image encryption algorithm based on hybrid chaotic maps with OpenCL implementation
ISSN: 1432-7643, 1433-7479Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.08.2020Published in Soft computing (Berlin, Germany) (01.08.2020)“… But some existing image encryption algorithms were proved that their security, encryption efficiency or computational speeds are not quite satisfactory for practical applications…”
Get full text
Journal Article -
16
An Efficient Image Encryption Algorithm Based on Innovative DES Structure and Hyperchaotic Keys
ISSN: 1549-8328, 1558-0806Published: New York IEEE 01.10.2023Published in IEEE transactions on circuits and systems. I, Regular papers (01.10.2023)“…In fact, as a traditional encryption method, DES has been certified as an unsuitable tool for ciphering due to its smaller key space…”
Get full text
Journal Article -
17
Incremental Deterministic Public-Key Encryption
ISSN: 0933-2790, 1432-1378Published: New York Springer US 01.01.2018Published in Journal of cryptology (01.01.2018)“… A deterministic encryption algorithm, however, cannot satisfy any meaningful notion of security for low-entropy plaintexts distributions, but Bellare et al…”
Get full text
Journal Article -
18
A Hierarchical Encryption and Key Management Scheme for Layered Access Control on H.264/SVC Bitstream in the Internet of Things
ISSN: 2327-4662, 2327-4662Published: Piscataway IEEE 01.09.2020Published in IEEE internet of things journal (01.09.2020)“…), there has been increased scrutiny on security of H.264/SVC. In this article, we propose a bitstream-oriented layered encryption scheme for SVC bitstream…”
Get full text
Journal Article -
19
Image encryption algorithm based on factorial decomposition
ISSN: 1573-7721, 1380-7501, 1573-7721Published: New York Springer US 01.12.2024Published in Multimedia tools and applications (01.12.2024)“…This study proposes a highly efficient image encryption algorithm by employing a rapid key generation approach and permutation structure…”
Get full text
Journal Article -
20
Image Encryption Algorithm Based on Adaptive Wavelet Chaos
ISSN: 1687-725X, 1687-7268Published: Cairo, Egypt Hindawi Publishing Corporation 2019Published in Journal of sensors (2019)“… Early image encryption technologies have shortcomings such as simple algorithm structure, small key space, and poor resistance to plaintext attacks…”
Get full text
Journal Article