Search Results - low computational key encryption algorithm

Refine Results
  1. 1

    Development of a quasi-real-time distribution voltage monitoring system by Sarkar, Subhra J, Sahoo, Sarat Kumar, Kundu, Palash K, Pattanayak, Rutuparna

    ISSN: 1751-8687, 1751-8695
    Published: The Institution of Engineering and Technology 16.10.2020
    “… A low computational, microcontroller implementable, asymmetric key encryption algorithm similar to Rivest–Shamir…”
    Get full text
    Journal Article
  2. 2

    Key-Free Image Encryption Algorithm Based on Self-Triggered Gaussian Noise Sampling by Gao, Kai, Chang, Chin-Chen, Lin, Chia-Chen

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 2024
    Published in IEEE access (2024)
    “… To overcome these problems, in this paper, we propose a key-free image encryption algorithm that offers low computational complexity and high security…”
    Get full text
    Journal Article
  3. 3

    H.264/AVC video encryption algorithm based on integer dynamic cross-coupling tent mapping model by Jin, Wang, Jiandong, Liu, Haoqiang, Xu

    ISSN: 1573-7721, 1380-7501, 1573-7721
    Published: New York Springer US 01.02.2024
    Published in Multimedia tools and applications (01.02.2024)
    “…-dimensional chaos encryption algorithm, this paper uses chaotic pseudo-random sequences generated by the integer dynamic…”
    Get full text
    Journal Article
  4. 4

    A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution by Arif, Jameel, Khan, Muazzam A, Ghaleb, Baraq, Ahmad, Jawad, Munir, Arslan, Rashid, Umer, Al-Dubai, Ahmed

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 01.01.2022
    Published in IEEE access (01.01.2022)
    “… However, these algorithms suffer from a low key-space, significant computational overhead, and a lag in resistance against differential attacks…”
    Get full text
    Journal Article
  5. 5

    New Key Generation and Encryption Algorithms for Privacy Preservation in Mobile Ad Hoc Networks by Amiruddin, Amiruddin, Ratna, Anak Agung Putri, Sari, Riri Fitri

    ISSN: 2076-0930, 2073-607X
    Published: 17.04.2022
    “… Our key generation algorithm modified Fibonacci sequence by adding scrambling factors to generate random key sequences with required length but incurred low computational overhead, whereas…”
    Get full text
    Journal Article
  6. 6

    Speech encryption algorithm using FFT and 3D-Lorenz–logistic chaotic map by Sathiyamurthi, P., Ramakrishnan, S.

    ISSN: 1380-7501, 1573-7721
    Published: New York Springer US 01.07.2020
    Published in Multimedia tools and applications (01.07.2020)
    “… In order to improve the drawbacks namely residual intelligibility in encrypted signal, poor quality in decrypted signal, low key space and high computational complexity that prevail in the exist…”
    Get full text
    Journal Article
  7. 7

    Hardware implementation of a strong pseudorandom number generator based block‐cipher system for color image encryption and decryption by Gafsi, Mohamed, Amdouni, Rim, Hajjaji, Mohamed Ali, Mtibaa, Abdellatif, Bourennane, El‐Bey

    ISSN: 0098-9886, 1097-007X
    Published: Bognor Regis Wiley Subscription Services, Inc 01.01.2023
    “… On the other hand, a robust algorithm is proposed to ensure high‐level security and low computational complexity of image encryption…”
    Get full text
    Journal Article
  8. 8

    Quantum Image Encryption Algorithm Based on Quantum Key Image by Wang, Jian, Geng, Ya-Cong, Han, Lei, Liu, Ji-Qiang

    ISSN: 0020-7748, 1572-9575
    Published: New York Springer US 01.01.2019
    “…Quantum image encryption is a hot research topic in recent years. In this paper, a novel quantum image encryption algorithm based on quantum key image is presented, which has low complexity than other algorithms…”
    Get full text
    Journal Article
  9. 9

    TFHE: Fast Fully Homomorphic Encryption Over the Torus by Chillotti, Ilaria, Gama, Nicolas, Georgieva, Mariya, Izabachène, Malika

    ISSN: 0933-2790, 1432-1378
    Published: New York Springer US 01.01.2020
    Published in Journal of cryptology (01.01.2020)
    “…This work describes a fast fully homomorphic encryption scheme over the torus (TFHE) that revisits, generalizes and improves the fully homomorphic encryption…”
    Get full text
    Journal Article
  10. 10

    New Key Generation and Encryption Algorithms for Privacy Preservation in Mobile Ad Hoc Networks by Amiruddin, Ratna, Anak Agung Putri, Sari, Riri Fitri

    ISSN: 2073-607X, 2076-0930
    Published: Kohat Kohat University of Science and Technology (KUST) 01.12.2017
    “… Our key generation algorithm modified Fibonacci sequence by adding scrambling factors to generate random key sequences with required length but incurred low computational overhead, whereas…”
    Get full text
    Journal Article
  11. 11

    Low Rank Parity Check Codes: New Decoding Algorithms and Applications to Cryptography by Aragon, Nicolas, Gaborit, Philippe, Hauteville, Adrien, Ruatta, Olivier, Zemor, Gilles

    ISSN: 0018-9448, 1557-9654
    Published: New York IEEE 01.12.2019
    Published in IEEE transactions on information theory (01.12.2019)
    “…) and public key encryption (PKE). Unlike rank metric codes used in previous encryption algorithms -notably Gabidulin codes - LRPC codes have a very weak algebraic structure…”
    Get full text
    Journal Article
  12. 12

    Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions by Singh, Saurabh, Sharma, Pradip Kumar, Moon, Seo Yeon, Park, Jong Hyuk

    ISSN: 1868-5137, 1868-5145
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.02.2024
    “… Nowadays, Internet of Things (IoT) enables many low resources and constrained devices to communicate, compute process and make decision in the communication network…”
    Get full text
    Journal Article
  13. 13

    Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map by Li, Jianhua, Liu, Hui

    ISSN: 1751-8709, 1751-8717
    Published: Stevenage The Institution of Engineering and Technology 01.12.2013
    Published in IET information security (01.12.2013)
    “…In this study, a novel scheme of advanced encryption standard (AES) is proposed. Its independent round key is generated by the two-dimensional (2D…”
    Get full text
    Journal Article
  14. 14

    Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange by Derler, David, Gellert, Kai, Jager, Tibor, Slamanig, Daniel, Striecks, Christoph

    ISSN: 0933-2790, 1432-1378
    Published: New York Springer US 01.04.2021
    Published in Journal of cryptology (01.04.2021)
    “…Forward secrecy is considered an essential design goal of modern key establishment (KE…”
    Get full text
    Journal Article
  15. 15

    A novel parallel image encryption algorithm based on hybrid chaotic maps with OpenCL implementation by You, Lin, Yang, Ersong, Wang, Guangyi

    ISSN: 1432-7643, 1433-7479
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.08.2020
    Published in Soft computing (Berlin, Germany) (01.08.2020)
    “… But some existing image encryption algorithms were proved that their security, encryption efficiency or computational speeds are not quite satisfactory for practical applications…”
    Get full text
    Journal Article
  16. 16

    An Efficient Image Encryption Algorithm Based on Innovative DES Structure and Hyperchaotic Keys by Li, Shih-Yu, Gai, Yanwen, Shih, Kai-Chung, Chen, Chin-Sheng

    ISSN: 1549-8328, 1558-0806
    Published: New York IEEE 01.10.2023
    “…In fact, as a traditional encryption method, DES has been certified as an unsuitable tool for ciphering due to its smaller key space…”
    Get full text
    Journal Article
  17. 17

    Incremental Deterministic Public-Key Encryption by Mironov, Ilya, Pandey, Omkant, Reingold, Omer, Segev, Gil

    ISSN: 0933-2790, 1432-1378
    Published: New York Springer US 01.01.2018
    Published in Journal of cryptology (01.01.2018)
    “… A deterministic encryption algorithm, however, cannot satisfy any meaningful notion of security for low-entropy plaintexts distributions, but Bellare et al…”
    Get full text
    Journal Article
  18. 18

    A Hierarchical Encryption and Key Management Scheme for Layered Access Control on H.264/SVC Bitstream in the Internet of Things by Xu, Cheng, Ren, Wei, Yu, Linchen, Zhu, Tianqing, Choo, Kim-Kwang Raymond

    ISSN: 2327-4662, 2327-4662
    Published: Piscataway IEEE 01.09.2020
    Published in IEEE internet of things journal (01.09.2020)
    “…), there has been increased scrutiny on security of H.264/SVC. In this article, we propose a bitstream-oriented layered encryption scheme for SVC bitstream…”
    Get full text
    Journal Article
  19. 19

    Image encryption algorithm based on factorial decomposition by AlShaikh, Muath, Alzaqebah, Malek, Gmati, Nabil, Alrefai, Nashat, Alsmadi, Mutasem K., Almarashdeh, Ibrahim, Mohammad, Rami Mustafa A., Alamri, Sultan, Kara, Mostefa

    ISSN: 1573-7721, 1380-7501, 1573-7721
    Published: New York Springer US 01.12.2024
    Published in Multimedia tools and applications (01.12.2024)
    “…This study proposes a highly efficient image encryption algorithm by employing a rapid key generation approach and permutation structure…”
    Get full text
    Journal Article
  20. 20

    Image Encryption Algorithm Based on Adaptive Wavelet Chaos by An, Feng-Ping, Liu, Jun-e

    ISSN: 1687-725X, 1687-7268
    Published: Cairo, Egypt Hindawi Publishing Corporation 2019
    Published in Journal of sensors (2019)
    “… Early image encryption technologies have shortcomings such as simple algorithm structure, small key space, and poor resistance to plaintext attacks…”
    Get full text
    Journal Article