Within this article, a method of symmetric encryption of information based on a hierarchical residue number system has been developed. The corresponding mathematical and algorithmic framework is presented. The propose...
详细信息
Advanced encryption Standard (AES) is one of the most widely used cipher for data encryption. However, recent studies have pointed out some weaknesses in the subkeys used in AES. Also, the sequential subkeys generatio...
详细信息
In the past decades cryptography and specifically encryption schemes were vastly researched. This is due to the developments in technology, communication, and the rising needs to use better, more resilient encryption ...
详细信息
With the development of the internet, social software and media have become ubiquitous, making images increasingly important in daily life. The dissemination of a large number of images on social networks has made inf...
详细信息
With the rapid development in the field of quantum computing, the security of traditional encryption algorithms is facing serious challenges. And quantum key distribution (QKD) provides a new way to solve the key dist...
详细信息
The applications of digital images is widespread in various fields such as medical diagnosis, film production, intelligent transportation, security monitoring, virtual reality and computer vision. The security of imag...
详细信息
This article presents an overview of the emergence, content and characteristics of the RSA encryption algorithm, offering a comprehensive exposition on its mathematical principles while highlighting its limitations. T...
详细信息
In this modern era, the exchange of information through the internet happens almost constantly. The security of this exchanged information is crucial to prevent unauthorized parties from misusing it. One frequently ex...
详细信息
Due to the large amount of computation required for authentication and matching in the data sharing phase, there is a certain delay in the real-time performance of the corresponding efficiency. Therefore, this paper p...
详细信息
Ransomware uses symmetric encryption algorithms to lock user files to extort money. This paper proposes a cryptographic algorithm loop identification method based on bit-precise execution, aiming to solve the problem ...
详细信息
暂无评论