With the advent of the era of big data and 5G communications' massive data, high-speed cryptographic algorithms are in demand. This paper proposes a new fast implementation of the Advanced encryption Standard (AES...
详细信息
The appearance of the terminal system of electric power Internet of Things has brought a lot of convenience to the electric power industry, but at the same time it is also facing increasingly severe network security c...
详细信息
encryption is crucial for securing sensitive data during transmission over networks. Various encryption techniques exist, such as AES, DES, and RC4, with AES being the most renowned algorithm. We proposed methodology ...
详细信息
Picture encryption or encoding of pictures is the techniques to safeguard picture being hacked or harmed while communicating. Such security strategy applied on communicates data starting with one hub then onto the nex...
详细信息
Chaos can be thought of as a superset of pseudo random number generators employed as a part of standard encryption algorithms and is a noteworthy and fundamental consequence of nonlinear dynamics. The important estima...
详细信息
ISBN:
(纸本)9781912764112
Chaos can be thought of as a superset of pseudo random number generators employed as a part of standard encryption algorithms and is a noteworthy and fundamental consequence of nonlinear dynamics. The important estimation of disarray is the capacity to create a wide range of different pseudo random number generating algorithms. While there are, on a fundamental level, a boundless number of chaos based algorithms that can be designed, they generally depend on the utilization of floating point arithmetic and require high precision floating point computations to produce sensibly extensive cycles. These floating point schemes are computationally intensive given that the number streams they create are generally changed into bit streams. In this context, this paper audits encryption methodologies in view of floating point algorithms.
In today's cryptographic landscape, evaluating encryption algorithms' integrity is crucial. Neural networks offer promise for extracting information from Data encryption Standard (DES) encrypted data. This rep...
详细信息
In the recent times, during COVID-19 statics tell, cyber-attacks have increased by up to 37%. While the lockdown all the companies are leveraging technologies accessible via internet to conduct their day to today work...
详细信息
Image encryption is a specialized subfield of cryptography, distinguished by the high correlation between neighboring pixels, which necessitates unique approaches to disrupt this correlation. While all encryption appr...
详细信息
With the rapid development of Internet of Things (IoT) technology, interconnectivity between devices has become increasingly widespread. However, traditional IoT security measures struggle to cope with increasingly co...
详细信息
In this paper, we study the privacy-preserving distributed optimization problem, aiming to prevent attackers from stealing the private information of agents. For this purpose, we propose a novel privacy-preserving alg...
详细信息
暂无评论