Wearable sensing has recently been highly preferred due to its quick and accurate measurement of physiological parameters. These sensors have been devised using various polymers [1], [2] and nanomaterials [3], [4] sui...
详细信息
A substitution box(S-Box)is a crucial component of contemporary cryptosystems that provide data protection in block *** the moment,chaotic maps are being created and extensively used to generate these SBoxes as a chao...
详细信息
A substitution box(S-Box)is a crucial component of contemporary cryptosystems that provide data protection in block *** the moment,chaotic maps are being created and extensively used to generate these SBoxes as a chaotic map assists in providing disorder and resistance to combat cryptanalytical *** this paper,the construction of a dynamic S-Box using a cipher key is proposed using a novel chaotic map and an innovative tweaking *** projected chaotic map and the proposed tweak approach are presented for the first time and the use of parameters in their workingmakes both of these dynamic in *** tweak approach employs cubic polynomials while permuting the values of an initial S-Box to enhance its cryptographic *** of the parameters are provided using the cipher key and a small variation in values of these parameters results in a completely different unique *** analysis and exploration confirmed that the projected chaoticmap exhibits a significant amount of chaotic *** security assessment in terms of bijectivity,nonlinearity,bits independence,strict avalanche,linear approximation probability,and differential probability criteria are utilized to critically investigate the effectiveness of the proposed S-Box against several *** proposed S-Box’s cryptographic performance is comparable to those of recently projected S-Boxes for its adaption in real-world security *** comparative scrutiny pacifies the genuine potential of the proposed S-Box in terms of its applicability for data security.
Nowadays, biometric systems have replaced password-or token-based authentication systems in many fields to improve the security level. However, biometric systems are also vulnerable to security threats. Unlike passwor...
详细信息
The neonatal period is the most vulnerable time for the development of seizures. Seizures in the immature brain lead to detrimental consequences, therefore require early diagnosis. The gold -standard for neonatal seiz...
详细信息
Existing self-supervised pre-trained speech models have offered an effective way to leverage massive unannotated corpora to build good automatic speech recognition (ASR). However, many current models are trained on a ...
详细信息
CRYSTALS-Kyber is a powerful Post-Quantum Cryptography(PQC) with high resistance to quantum computer attacks. In order to optimize the core sampling structure of Kyber so as to improve the hardware execution efficienc...
详细信息
As intelligent surveillance system applications become ubiquitous, automated crowd counting solutions must be made continually faster and accurate. This paper presents an improved convolutional neural network (CNN) ar...
详细信息
Neural networks are more commonly used to identify systems for system diagnostics without fully implementing and building the system. The project aims to design and implement the neural network identification system a...
详细信息
In order to solve the problem of memory and computation bottleneck in neural networks and improve the efficiency of computation, this paper proposes a design scheme of ternary multiply-accumulate circuits based on dom...
详细信息
In the post-quantum Kyber algorithm, the Hash computation directly affects the processing speed of key generation, noise polynomial, and key exchange processes. To address the issues of multiple types of Hash computat...
详细信息
暂无评论