-
21
Revocation encryption scheme based on domestic cryptographic algorithm SM9
Published 2025-05-01“…To address the limitations of lengthy system public keys and inefficient decryption in existing identity-based revocation encryption schemes, an optimized revocation encryption scheme was proposed based on SM9, China’s independently developed identity-based cryptographic algorithm. …”
Get full text
Article -
22
Enhanced Homomorphic Encryption for Cloud Security Through Individual Optimization
Published 2025-01-01“…The study that has been suggested makes use of the technique of particle swarm optimization to achieve the goal of enhancing the encryption key. …”
Get full text
Article -
23
Image Encryption Using Compressive Sensing and Detour Cylindrical Diffraction
Published 2018-01-01Get full text
Article -
24
Enhancing Cloud Task Scheduling With a Robust Security Approach and Optimized Hybrid POA
Published 2023-01-01“…The hybrid optimization enables the proposed algorithm to provide efficient task scheduling by exploiting the strengths of entire algorithms. …”
Get full text
Article -
25
Single-Shot Optical Multiple-Image Encryption Based on Polarization-Resolved Diffractive Imaging
Published 2019-01-01“…A new method for optical multiple-image encryption based on polarization-resolved diffraction imaging is proposed in this study. …”
Get full text
Article -
26
Optimized Video Watermarking With Entropy-Aware Block Selection and Modified Hénon-Map Encryption
Published 2024-01-01Get full text
Article -
27
A Practical Algorithm for Physical Layer Encryption Under Constant Envelope Constraint
Published 2025-01-01“…In this paper, we present a novel mask design algorithm that offers three key advantages compared to state-of-the-art methods: optimal Peak-to-Average Power Ratio (PAPR), applicability to both Gaussian and flat fading channels, and a high level of confidentiality. …”
Get full text
Article -
28
Evaluation of the Effectiveness of Lightweight Encryption Algorithms on Data Performance and Security on IoT Devices
Published 2025-06-01“…This research contributes a comparative framework to guide the selection of encryption algorithms for IoT systems, ensuring an optimal trade-off between security and operational efficiency.…”
Get full text
Article -
29
Efficient implementation for BFV fully homomorphic encryption algorithm based on Zynq platform
Published 2024-09-01“…An efficient implementation scheme for the BFV fully homomorphic encryption algorithm was proposed on the Zynq platform. …”
Get full text
Article -
30
A New Image Encryption Method Using an Optimized Smart Codebook
Published 2025-01-01Get full text
Article -
31
Joint Encryption and Optimization for 6G MEC-Enabled IoT Networks
Published 2025-01-01“…An optimization algorithm is introduced to address these challenges by jointly allocating resources, thereby optimizing throughput, conserving energy, and meeting latency benchmarks through dynamic system adaptation. …”
Get full text
Article -
32
Blockchain Enabled Secure Medical Data Transmission and Diagnosis Using Golden Jackal Optimization Algorithm with Deep Learning
Published 2024-10-01“…Also, BC is implemented to store the encrypted imageries. Next, the diagnostic method includes Bayesian optimization algorithm (BOA) based hyper parameter tuning, deep belief network (DBN)-based classification, and CapsNet-based feature extraction. …”
Get full text
Article -
33
-
34
Key-customizable encrypted deduplication with access control for cloud storage
Published 2024-08-01Get full text
Article -
35
-
36
A Novel Multi-Channel Image Encryption Algorithm Leveraging Pixel Reorganization and Hyperchaotic Maps
Published 2024-12-01Get full text
Article -
37
A Lightweight Symmetric DNA Encryption Algorithm Inspired by Protein Synthesis (SDEAP) for IoT Devices
Published 2025-02-01“…In this paper, a new lightweight symmetric DNA encryption algorithm inspired by protein synthesis (SDEAP) is proposed. …”
Get full text
Article -
38
Optical audio cryptosystem using hyperchaotic implementation in Gyrator domain
Published 2025-05-01“…The proposed algorithm involves merging chaos theory with conventional cryptographic techniques to create an optical encryption algorithm that aligns better with the properties of digital audio. …”
Get full text
Article -
39
A new method for decoding an encrypted text by genetic algorithms and its comparison with tabu search and simulated annealing
Published 2014-02-01“…Genetic Algorithm is an algorithm based on population and many optimization problems are solved with this method, successfully. …”
Get full text
Article -
40
Quantum Circuit Implementation and Resource Analysis for Triple Data Encryption Standard (DES) (Triple-DES)
Published 2025-04-01Get full text
Article