The rise of quantum computing poses a grave threat to current cryptographic methods. While Quantum Key Distribution (QKD) offers a potential solution, guaranteeing its security in real-world implementations remains ch...
详细信息
This study presents a comprehensive performance analysis of symmetric encryption algorithms in the context of time-critical cybersecurity applications. We evaluate a diverse set of algorithms, including established st...
详细信息
This work examines the potential of quantum resistant variants of NIST IR 8454 lightweight encryption algorithms in the field of image encryption. Selected algorithms from ASCON, TinyJAMBU and SPARKLE families were an...
详细信息
In today's digital era, cryptographic algorithms play a vital role in safeguarding sensitive information, maintaining confidentiality, and defending against cyberattacks. With the growing variety of encryption met...
详细信息
This paper briefly introduces wireless sensor networks (WSNs) and proposes an enhancement to a block encryption algorithm using chaotic mapping principles. The proposed encryption algorithm was tested on an establishe...
详细信息
We will construct post-quantum encryption algorithms based on three-variable polynomial Beal-Schur congruence. After giving a proof of Beal's conjecture and citing some applications of it to selected cases where t...
详细信息
With the rise of IoT technology, the usage of IoT devices and systems is steadily increasing. However, concerns over excessive overhead and data security in IoT perceptual layer communication are becoming increasingly...
详细信息
Chaotic map, due to its excellent unpredictability and complexity, is widely used in various fields, such as information security, information communication, and system control, etc., thus research work is being inten...
详细信息
In this paper, we propose an audio encryption scheme that supports differentiated decryption, called AES-AUDIO, in which an audio only needs to be encrypted once and can be decrypted into different resolutions as need...
详细信息
Images are widely used in social networks, necessitating efficient and secure transmission, especially in bandwidth-constrained environments. This paper aims to develop a color image encryption algorithm that enhances...
详细信息
暂无评论