In this paper we construct a new efficient updatable encryption (UE) scheme based on FrodoPKE learning with errors key encapsulation [1]. We analyse the security of the proposed scheme in the backward-leak uni-directi...
详细信息
This research explores the data security of the Internet of Things (IoT), with a specific focus on designing cryptographic algorithms suitable for the resource-constrained ESP32 microcontroller. Referencing existing A...
详细信息
Each new image cryptosystem aims to achieve improved security results, with entropy being one of the primary measures for quantifying its security. For 8-bit images, the ideal entropy value is 8.0. However, various en...
详细信息
With the rapid development of information technology, network security has become an increasingly important focus. As a key means to protect data security, encryption technology is crucial to enhance its security. How...
详细信息
Secure data protection is more vital than ever as internet dangers proliferate. Five key approaches comprise this study's comprehensive security design. They are the Advanced encryption Algorithm (AEA), DIDS, BBA,...
详细信息
A systematic analysis of the use of the hypercomplex numbers in the construction of the cryptographic algorithms is given. The cases of constructing various types of ciphers, both symmetric and asymmetric, with the us...
详细信息
The discrete logarithm problem is a computationally hard problem that is widely employed in public-key cryptography, based on the assumption that there exists no general method to efficiently solve discrete logs. In t...
详细信息
In our work, we proposed, a strictly justified, method for testing independence verification and created a corresponding algorithm. We applied this algorithm to different test suits and obtained rather expected result...
详细信息
As encryption algorithms are widely used, the shortcomings of Advanced encryption Standard (AES) round keys with strong correlation between them have also been found. In this paper, an improved AES scheme based on Log...
详细信息
For the problem that the communication between maritime devices may be listened to by the adversary, resulting in the data shared between maritime devices may also be tampered with and forged by the adversary, thus je...
详细信息
暂无评论