Výsledky vyhledávání - low computational key encryption algorithm
-
1
Development of a quasi-real-time distribution voltage monitoring system
ISSN: 1751-8687, 1751-8695Vydáno: The Institution of Engineering and Technology 16.10.2020Vydáno v IET generation, transmission & distribution (16.10.2020)“… A low computational, microcontroller implementable, asymmetric key encryption algorithm similar to Rivest–Shamir…”
Získat plný text
Journal Article -
2
Key-Free Image Encryption Algorithm Based on Self-Triggered Gaussian Noise Sampling
ISSN: 2169-3536, 2169-3536Vydáno: Piscataway IEEE 2024Vydáno v IEEE access (2024)“… To overcome these problems, in this paper, we propose a key-free image encryption algorithm that offers low computational complexity and high security…”
Získat plný text
Journal Article -
3
H.264/AVC video encryption algorithm based on integer dynamic cross-coupling tent mapping model
ISSN: 1573-7721, 1380-7501, 1573-7721Vydáno: New York Springer US 01.02.2024Vydáno v Multimedia tools and applications (01.02.2024)“…-dimensional chaos encryption algorithm, this paper uses chaotic pseudo-random sequences generated by the integer dynamic…”
Získat plný text
Journal Article -
4
A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution
ISSN: 2169-3536, 2169-3536Vydáno: Piscataway IEEE 01.01.2022Vydáno v IEEE access (01.01.2022)“… However, these algorithms suffer from a low key-space, significant computational overhead, and a lag in resistance against differential attacks…”
Získat plný text
Journal Article -
5
New Key Generation and Encryption Algorithms for Privacy Preservation in Mobile Ad Hoc Networks
ISSN: 2076-0930, 2073-607XVydáno: 17.04.2022Vydáno v International journal of communication networks and information security (17.04.2022)“… Our key generation algorithm modified Fibonacci sequence by adding scrambling factors to generate random key sequences with required length but incurred low computational overhead, whereas…”
Získat plný text
Journal Article -
6
Speech encryption algorithm using FFT and 3D-Lorenz–logistic chaotic map
ISSN: 1380-7501, 1573-7721Vydáno: New York Springer US 01.07.2020Vydáno v Multimedia tools and applications (01.07.2020)“… In order to improve the drawbacks namely residual intelligibility in encrypted signal, poor quality in decrypted signal, low key space and high computational complexity that prevail in the exist…”
Získat plný text
Journal Article -
7
Hardware implementation of a strong pseudorandom number generator based block‐cipher system for color image encryption and decryption
ISSN: 0098-9886, 1097-007XVydáno: Bognor Regis Wiley Subscription Services, Inc 01.01.2023Vydáno v International journal of circuit theory and applications (01.01.2023)“… On the other hand, a robust algorithm is proposed to ensure high‐level security and low computational complexity of image encryption…”
Získat plný text
Journal Article -
8
Quantum Image Encryption Algorithm Based on Quantum Key Image
ISSN: 0020-7748, 1572-9575Vydáno: New York Springer US 01.01.2019Vydáno v International journal of theoretical physics (01.01.2019)“…Quantum image encryption is a hot research topic in recent years. In this paper, a novel quantum image encryption algorithm based on quantum key image is presented, which has low complexity than other algorithms…”
Získat plný text
Journal Article -
9
TFHE: Fast Fully Homomorphic Encryption Over the Torus
ISSN: 0933-2790, 1432-1378Vydáno: New York Springer US 01.01.2020Vydáno v Journal of cryptology (01.01.2020)“…This work describes a fast fully homomorphic encryption scheme over the torus (TFHE) that revisits, generalizes and improves the fully homomorphic encryption…”
Získat plný text
Journal Article -
10
New Key Generation and Encryption Algorithms for Privacy Preservation in Mobile Ad Hoc Networks
ISSN: 2073-607X, 2076-0930Vydáno: Kohat Kohat University of Science and Technology (KUST) 01.12.2017Vydáno v International journal of communication networks and information security (01.12.2017)“… Our key generation algorithm modified Fibonacci sequence by adding scrambling factors to generate random key sequences with required length but incurred low computational overhead, whereas…”
Získat plný text
Journal Article -
11
Low Rank Parity Check Codes: New Decoding Algorithms and Applications to Cryptography
ISSN: 0018-9448, 1557-9654Vydáno: New York IEEE 01.12.2019Vydáno v IEEE transactions on information theory (01.12.2019)“…) and public key encryption (PKE). Unlike rank metric codes used in previous encryption algorithms -notably Gabidulin codes - LRPC codes have a very weak algebraic structure…”
Získat plný text
Journal Article -
12
Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions
ISSN: 1868-5137, 1868-5145Vydáno: Berlin/Heidelberg Springer Berlin Heidelberg 01.02.2024Vydáno v Journal of ambient intelligence and humanized computing (01.02.2024)“… Nowadays, Internet of Things (IoT) enables many low resources and constrained devices to communicate, compute process and make decision in the communication network…”
Získat plný text
Journal Article -
13
Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map
ISSN: 1751-8709, 1751-8717Vydáno: Stevenage The Institution of Engineering and Technology 01.12.2013Vydáno v IET information security (01.12.2013)“…In this study, a novel scheme of advanced encryption standard (AES) is proposed. Its independent round key is generated by the two-dimensional (2D…”
Získat plný text
Journal Article -
14
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
ISSN: 0933-2790, 1432-1378Vydáno: New York Springer US 01.04.2021Vydáno v Journal of cryptology (01.04.2021)“…Forward secrecy is considered an essential design goal of modern key establishment (KE…”
Získat plný text
Journal Article -
15
A novel parallel image encryption algorithm based on hybrid chaotic maps with OpenCL implementation
ISSN: 1432-7643, 1433-7479Vydáno: Berlin/Heidelberg Springer Berlin Heidelberg 01.08.2020Vydáno v Soft computing (Berlin, Germany) (01.08.2020)“… But some existing image encryption algorithms were proved that their security, encryption efficiency or computational speeds are not quite satisfactory for practical applications…”
Získat plný text
Journal Article -
16
An Efficient Image Encryption Algorithm Based on Innovative DES Structure and Hyperchaotic Keys
ISSN: 1549-8328, 1558-0806Vydáno: New York IEEE 01.10.2023Vydáno v IEEE transactions on circuits and systems. I, Regular papers (01.10.2023)“…In fact, as a traditional encryption method, DES has been certified as an unsuitable tool for ciphering due to its smaller key space…”
Získat plný text
Journal Article -
17
Incremental Deterministic Public-Key Encryption
ISSN: 0933-2790, 1432-1378Vydáno: New York Springer US 01.01.2018Vydáno v Journal of cryptology (01.01.2018)“… A deterministic encryption algorithm, however, cannot satisfy any meaningful notion of security for low-entropy plaintexts distributions, but Bellare et al…”
Získat plný text
Journal Article -
18
A Hierarchical Encryption and Key Management Scheme for Layered Access Control on H.264/SVC Bitstream in the Internet of Things
ISSN: 2327-4662, 2327-4662Vydáno: Piscataway IEEE 01.09.2020Vydáno v IEEE internet of things journal (01.09.2020)“…), there has been increased scrutiny on security of H.264/SVC. In this article, we propose a bitstream-oriented layered encryption scheme for SVC bitstream…”
Získat plný text
Journal Article -
19
Image encryption algorithm based on factorial decomposition
ISSN: 1573-7721, 1380-7501, 1573-7721Vydáno: New York Springer US 01.12.2024Vydáno v Multimedia tools and applications (01.12.2024)“…This study proposes a highly efficient image encryption algorithm by employing a rapid key generation approach and permutation structure…”
Získat plný text
Journal Article -
20
Image Encryption Algorithm Based on Adaptive Wavelet Chaos
ISSN: 1687-725X, 1687-7268Vydáno: Cairo, Egypt Hindawi Publishing Corporation 2019Vydáno v Journal of sensors (2019)“… Early image encryption technologies have shortcomings such as simple algorithm structure, small key space, and poor resistance to plaintext attacks…”
Získat plný text
Journal Article