In the era of edge computing, securing data transmission has become paramount, especially given the real-time requirements and limited computational resources of edge devices. This study introduces a novel Chaos Theor...
详细信息
This paper introduces an image encryption algorithm based on 2D-Sine-Cosine chaotic mapping and compressed sensing technology. This algorithm introduces a novel 2D-Sine-Cosine chaotic mapping function. By using nested...
详细信息
Aiming at the problem of improving image security in the process of transmission line monitoring under the condition of limited computing resources, a security encryption algorithm for transmission line monitoring ima...
详细信息
To ensure data security during the gateway's data uploading process, we introduce the advantages of chaotic mapping to AES. We then develop a multi-protocol encrypted gateway architecture based on an improved AES ...
详细信息
Modular exponentiation (ME) is a mathematical operation that is used for several public-key cryptosystems (PKCs) and other applications. It is a complex task that is an essential computational tool that enables effici...
详细信息
Tripe Advanced encryption Standard was utilized for the purpose of enhancing retrieval rate analysis in privacy data sharing secured cloud computing. This was contrasted to Blowfish. Many people believe that security ...
详细信息
Advanced encryption Standard (AES) is one of the most widely used cipher for data encryption. However, recent studies have pointed out some weaknesses in the subkeys used in AES. Also, the sequential subkeys generatio...
详细信息
Within this article, a method of symmetric encryption of information based on a hierarchical residue number system has been developed. The corresponding mathematical and algorithmic framework is presented. The propose...
详细信息
With the development of the internet, social software and media have become ubiquitous, making images increasingly important in daily life. The dissemination of a large number of images on social networks has made inf...
详细信息
With the rapid development in the field of quantum computing, the security of traditional encryption algorithms is facing serious challenges. And quantum key distribution (QKD) provides a new way to solve the key dist...
详细信息
暂无评论