In the power grid, due to the diversity of data sensitivity, a reasonable encryption strategy is designed to ensure that only users with corresponding attributes can access data of specific sensitivity. Therefore, a d...
详细信息
The article proposes a new quantum-resistant cryptographic algorithm constructed based on the OTP (One-Time Pad) cipher and a hash function. By inheriting the property of 'perfect secrecy' from the OTP cipher,...
详细信息
Particularly, in the last two decades, digital technologies have rapidly grown in a walk of life such as education, finance, information technology, e-vehicles, smart-homes, health care, etc. Therefore, the involved d...
详细信息
The security of commercial encryption algorithms has always been a focus of attention. The SM4 algorithm, a commercial cryptographic standard, has been recognized by ISO/IEC as an international standard and has shown ...
详细信息
The proposed study explores the use of convolutional neural networks (CNNs) in the field of neural cryptography, aiming to improve secure communication protocols with more adaptive, data-driven models. Moving away fro...
详细信息
This article explores the application and research of National encryption Algorithm in the primary school student supervision system's function of binding and picking up personnel. Firstly, the basic principles of...
详细信息
As numerous power IoT terminals require secure access to the power grid, how to detect the encrypted malicious traffic in power IoT becomes a challenge. Following an in-depth investigation of potential security risks ...
详细信息
The broad spectrum of cryptography provides secure protocols for communication and data security. These protocols are based on structures of mathematics such as groups, rings and fields. In particular, cyclic groups a...
详细信息
Power analysis attacks have emerged as a significant threat to the security of elliptic curve cryptography (ECC), necessitating the development of countermeasures that can safeguard against such attacks without compro...
详细信息
The Residue Number System is widely used in cryptography, digital signal processing, image processing systems and other areas where high-performance computation is required. One of the computationally expensive operat...
详细信息
暂无评论