This research explores the data security of the Internet of Things (IoT), with a specific focus on designing cryptographic algorithms suitable for the resource-constrained ESP32 microcontroller. Referencing existing A...
详细信息
With the rapid development of information technology, network security has become an increasingly important focus. As a key means to protect data security, encryption technology is crucial to enhance its security. How...
详细信息
The discrete logarithm problem is a computationally hard problem that is widely employed in public-key cryptography, based on the assumption that there exists no general method to efficiently solve discrete logs. In t...
详细信息
Secure data protection is more vital than ever as internet dangers proliferate. Five key approaches comprise this study's comprehensive security design. They are the Advanced encryption Algorithm (AEA), DIDS, BBA,...
详细信息
A systematic analysis of the use of the hypercomplex numbers in the construction of the cryptographic algorithms is given. The cases of constructing various types of ciphers, both symmetric and asymmetric, with the us...
详细信息
In our work, we proposed, a strictly justified, method for testing independence verification and created a corresponding algorithm. We applied this algorithm to different test suits and obtained rather expected result...
详细信息
For the problem that the communication between maritime devices may be listened to by the adversary, resulting in the data shared between maritime devices may also be tampered with and forged by the adversary, thus je...
详细信息
As encryption algorithms are widely used, the shortcomings of Advanced encryption Standard (AES) round keys with strong correlation between them have also been found. In this paper, an improved AES scheme based on Log...
详细信息
The article proposes a new quantum-resistant cryptographic algorithm constructed based on the OTP (One-Time Pad) cipher and a hash function. By inheriting the property of 'perfect secrecy' from the OTP cipher,...
详细信息
In the power grid, due to the diversity of data sensitivity, a reasonable encryption strategy is designed to ensure that only users with corresponding attributes can access data of specific sensitivity. Therefore, a d...
详细信息
暂无评论