-
121
Full lifecycle security management scheme for terminal keys under power IoT
Published 2025-01-01“…Firstly, the two-stage key distribution architecture based on the state secret algorithm is adopted in the scheme to achieve secure access authentication of power terminals at different stages. …”
Get full text
Article -
122
Using the Genetic Algorithm in Developing a Method for Steganography
Published 2013-12-01“…This paper has developed a method for hiding in images, as it was first encrypt the secret message chaoticlly using the chaotic encryption algorithm and secondly execute the steganography in two phases, the first divide the cover image (.BMP, .PNG) to a group of sections (Blocks) with the diagonal sequence and make hiding using the cell of the least Significant Bit (LSB) within (Bytes) of certain randomly, and then using the Genetic Algorithm (GA) and working at the expense of Peak Signal to Noise Ratio(PSNR) for each section after the steganography and then get the best PSNR value of the optimal section (ie, a better distribution of the random sites). …”
Get full text
Article -
123
Acousto-optic cryptosystem based on dynamic DNA encoding and hyperchaotic system in gyrator domains
Published 2025-05-01“…Subsequently, employing an Acousto-optic modulation algorithm, audio information is fitted into image information and serves as part of the encryption system key, significantly enhancing the correlation between the key and the user. …”
Get full text
Article -
124
Differential analysis of lightweight cipher algorithm ACE based on MILP
Published 2023-01-01“…The differential property of the lightweight cipher algorithm ACE was researched.n-dimension ring AND-gate combination was defined and its differential property was described accurately by only O(n) expressions with the MILP method by analyzing the relationship among AND gates.The nonlinear operation of ACE was transformed to the 32-dimension ring AND-gate combination and the MILP differential model of ACE was proposed.According to the characteristics of Gurobi solver, a model for fast solving the MILP differential model of ACE was given.For ACE permutation with 3 to 6 steps, the optimal differential characteristic was obtained and its probability was improved by multi-difference technique.The differential forge attack on authenticated encryption algorithm ACE-<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mi mathvariant="script">A</mi><mi mathvariant="script">E</mi></math></inline-formula>-128 and the differential collision attack on hash algorithm ACE-<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mi mathvariant="script">H</mi></math></inline-formula>-256 was given with 3-step ACE permutation, and the success probability was 2<sup>-90.52</sup>.And it was proved that the 4-steps ACE permutation arrived the differential security bound of 128 bit.Actually, the MILP differential description of ring AND-gate combination can be applied on more cipher algorithms, such as SIMON, Simeck.…”
Get full text
Article -
125
CRYPTO-RESISTANT METHODS AND RANDOM NUMBER GENERATORS IN INTERNET OF THINGS (IOT) DEVICES
Published 2022-06-01“…The analysis of technologies and circuit solutions allowed to draw the following conclusions: protection of IoT solutions includes: security of IoT network nodes and their connection to the cloud using secure protocols, ensuring confidentiality, authenticity and integrity of IoT data by cryptographic methods, attack analysis and network cryptographic stability; the initial basis for the protection of IoT solutions is the true randomness of the formed RNG sequences and used in algorithms for cryptographic transformation of information to protect it; feature of IoT devices is their heterogeneity and geographical distribution, limited computing resources and power supply, small size; The most effective (reduce power consumption and increase the generation rate) for use in IoT devices are RNG exclusively on a digital basis, which implements a three-stage process: the initial digital circuit, normalizer and random number flow generator; Autonomous Boolean networks (ABN) allow to create RNG with unique characteristics: the received numbers are really random, high speed – the number can be received in one measure, the minimum power consumption, miniature, high (up to 3 GHz) throughput of Boolean chaos; a promising area of ABN development is the use of optical logic valves for the construction of optical ABN with a bandwidth of up to 14 GHz; the classification of known classes of RNG attacks includes: direct cryptanalytic attacks, attacks based on input data, attacks based on the disclosure of the internal state of RNG, correlation attacks and special attacks; statistical test packages to evaluate RNG sequences have some limitations or shortcomings and do not replace cryptanalysis; Comparison of cryptoaccelerators with cryptographic transformation software shows their significant advantages: for AES block encryption algorithm, speeds increase by 10-20 times in 8/16-bit cryptoaccelerators and 150 times in 32-bit, growth hashing of SHA-256 in 32-bit cryptoaccelerators more than 100 times, and for the NMAS algorithm - up to 500 times. …”
Get full text
Article -
126
An Efficient Fine-Grained Access Control Scheme Based on Policy Protection in SGs
Published 2025-01-01Get full text
Article -
127
WiFi Indoor Positioning Based on EGA-PF and Fernet Algorithm
Published 2025-01-01“…In this regard, the random sampling and resampling techniques of the particle filtering (PF) algorithm are utilized for secondary optimization of the selection of the GA. …”
Get full text
Article -
128
Network Efficient Hierarchical Authentication Algorithm for Secure Communication in IoT and IoE
Published 2024-01-01“…The algorithm outperforms traditional encryption algorithms by excelling in scalability, handling large datasets efficiently through its hierarchical encryption framework. …”
Get full text
Article -
129
Privacy protection risk identification mechanism based on automated feature combination
Published 2024-11-01“…This algorithm enhanced computational efficiency in feature combination optimization by 99.93%. …”
Get full text
Article -
130
Comprehensive Analysis of Lightweight Cryptographic Algorithms for Battery-Limited Internet of Things Devices
Published 2025-01-01“…Among the main trends that were covered were the trade-offs between resource limitations and security strength, hardware–software co-optimization, block and stream cipher optimization, and hybrid encryption techniques. …”
Get full text
Article -
131
Development and investigation of parallel model of bee colony algorithms for cryptanalysis problem solving
Published 2017-03-01“…It should be noted (and it was observed in the previous works) that the distinctive feature of applying the bioinspired meth-ods of cryptanalysis is the applicability of the encryption-decryption algorithm as a criterion function for the evaluation of the key ac-ceptability defined by the bioinspired method operations. …”
Get full text
Article -
132
Research on Digital Image Watermarking Algorithm Based on Scrambling and Singular Value Decomposition
Published 2022-01-01“…The transmittance of the degraded image is calculated, the transmittance is refined by relying on the soft matting algorithm and guiding filter, the image contrast in the image frequency domain is enhanced, and the results are mapped to the appropriate visual range to optimize the visual brightness of the image. …”
Get full text
Article -
133
Secure K-Means Clustering Scheme for Confidential Data Based on Paillier Cryptosystem
Published 2025-06-01“…Although this protocol solves the key problems of secure distance computation, cluster assignment and centroid update, there are still areas for further research. These include optimizing the computational efficiency of the protocol, exploring other homomorphic encryption schemes that may provide better performance, and extending the protocol to handle more complex clustering algorithms.…”
Get full text
Article -
134
Cyber-Secure IoT and Machine Learning Framework for Optimal Emergency Ambulance Allocation
Published 2025-06-01“…Optimizing ambulance deployment is a critical task in emergency medical services (EMS), as it directly affects patient outcomes and system efficiency. …”
Get full text
Article -
135
Security decision method for the edge of multi-layer satellite network based on reinforcement learning
Published 2022-06-01“…Specifically, the edge center node obtains the environmental state of the satellite network through the perception system, and on this basis, uses the ability of deep reinforcement learning algorithm to learn independently, and obtains the optimal data offloading strategy in the scene by fitting, and obtains the optimal link planning., so that the onboard resources can be fully utilized, so as to achieve the goal of minimizing the average return delay of many observation tasks.First,the edge center node observes the environment and obtains state elements such as the data volume, channel conditions, and edge node processing capability of the observation satellite mission in the environment. …”
Get full text
Article -
136
VLSI implementation of AES algorithm against differential power attack and differential fault attack
Published 2010-01-01“…A VLSI implementation of AES algorithm against both differential power attack and differential fault attack was proposed. …”
Get full text
Article -
137
Stochastic job stream scheduling method for cipher chip with multi-cryptography
Published 2016-12-01“…Aiming at the rich of safety requirements of tasks which resulting in random cross access to multi cipher algorithms, a hierarchical hardware scheduling method was presented with associated control based on data identifica-tion. …”
Get full text
Article -
138
Mathematical Background and Algorithms of a Collection of Android Apps for a Google Play Store Page
Published 2025-04-01“…The second application suggests a secure file management system for Android, utilizing encryption and access control algorithms to safeguard user privacy. …”
Get full text
Article -
139
A privacy preserving machine learning framework for medical image analysis using quantized fully connected neural networks with TFHE based inference
Published 2025-07-01“…The FCNN model is trained in a plaintext environment for FHE compatibility using Quantization-Aware Training to optimize weights and activations. The quantized FCNN model is then validated under FHE constraints through simulation and compiled into an FHE-compatible circuit for encrypted inference on sensitive data. …”
Get full text
Article -
140
Efficient and Composable Masked AES S-Box Designs Using Optimized Inverters
Published 2024-12-01“… Hardware implementations of cryptographic algorithms are susceptible to power analysis attacks, allowing attackers to break the otherwise strong security guarantees. …”
Get full text
Article