In the digital era, image encryption security is a focus. Facing security risks such as the irrelevance of plaintext and ciphertext and the independence of the disarrangement and diffusion steps, a new algorithm combi...
详细信息
This study focuses on development of a secure and efficient image cryptosystem optimized for IoT devices. The proposed technique addresses the and resource constraints of IoT devices, it introduces a hybrid encryption...
详细信息
In order to ensure the security of communication information under attack, a research on secure encrypted communication method for unmanned aerial vehicle systems based on hybrid encryption algorithm is proposed. Afte...
详细信息
With the rapid development of the internet and information technology, the traditional encryption methods suffer from drawbacks such as poor processing capacity and low security, making them vulnerable to attacks. Thi...
详细信息
The increasing necessity for secure communication in resource-constrained platforms those found in the Internet of Things (IoT), has drawn to a key spike in demand for lightweight symmetric cyphers. However, a number ...
详细信息
With the rapid advancement of cloud computing, significant security concerns regarding data storage have been continuously raised. When the encrypted images are stored in the cloud, reversible data hiding in encrypted...
详细信息
This paper introduces a new encryption technique which bases its operations on advanced bivariate mathematical functions and uses a genetic algorithm to optimize these along with random key generation techniques. This...
详细信息
Patterns are key to decrypting messages. Language is composed of repeat groupings of symbols encoded in words and the syntax of a language. Patterns bleed through encryption since all encryption algorithms can be repl...
详细信息
In view of the problems of small key space and poor key sensitivity in classical image encryption algorithm, the characteristics of chaotic system and M set are analyzed, and a new image encryption algorithm is propos...
详细信息
Quantum information can be used to achieve novel cryptographic primitives that are impossible to achieve classically. A recent work by Ananth, Poremba, Vaikuntanathan (TCC 2023) focuses on equipping the dual-Regev enc...
详细信息
暂无评论