-
1
FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review
Published 2021-03-01Get full text
Article -
2
The A New Strategy to Enhance the Security of GPS Location by PGP Algorithm in Smart Containers
Published 2022-06-01“…The encrypted GPS location is sent across any communication channel. …”
Get full text
Article -
3
A HYBRID ELLIPTIC CURVE AND DATA ENCRYPTION STANDARD ALGORITHM FOR SECURE DATA COMMUNICATION
Published 2024-10-01“…The methodology involves first encrypting data using DES and subsequently applying ECC to the DES-encrypted output, thus providing a dual-layer encryption mechanism. …”
Get full text
Article -
4
Cloud Data Security through BB84 Protocol and Genetic Algorithm
Published 2022-12-01“…Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. …”
Get full text
Article -
5
Optimized Hybrid Central Processing Unit–Graphics Processing Unit Workflow for Accelerating Advanced Encryption Standard Encryption: Performance Evaluation and Computational Modeli...
Published 2025-04-01“…This study addresses the growing demand for scalable data encryption by evaluating the performance of AES (Advanced Encryption Standard) encryption and decryption using CBC (Cipher Block Chaining) and CTR (Counter Mode) modes across various CPU (Central Processing Unit) and GPU (Graphics Processing Unit) hardware models. …”
Get full text
Article -
6
Analyzing cryptographic algorithm efficiency with in graph-based encryption models
Published 2025-07-01“…Accordingly, the evaluation of the encryption algorithms was conducted using criteria such as encryption time, decryption time, and throughput to determine their relative performance. …”
Get full text
Article -
7
Privacy-preserving method for face recognition based on homomorphic encryption.
Published 2025-01-01“…The framework first utilizes a pre-trained model to extract facial feature templates, which are then encrypted. The encrypted templates are matched using Euclidean distance, with the final recognition being performed after decryption. …”
Get full text
Article -
8
Touch of Privacy: A Homomorphic Encryption-Powered Deep Learning Framework for Fingerprint Authentication
Published 2025-01-01“…The CNN classifies encrypted features without decryption, ensuring secure authentication. …”
Get full text
Article -
9
A robust approach to satellite image encryption using chaotic map and circulant matrices
Published 2024-12-01“…These findings verify the scheme's ability to come across the most stringent encryption and decryption standards, making it an effective solution for securing sensitive satellite image data.…”
Get full text
Article -
10
Secure and Scalable File Encryption for Cloud Systems via Distributed Integration of Quantum and Classical Cryptography
Published 2025-07-01“…The master node performs centralized decryption by collecting encrypted subsets, recovering the AES key, and executing decryption in parallel. …”
Get full text
Article -
11
Hybrid Cryptographic End-to-End Encryption Method for Protecting IoT Devices Against MitM Attacks
Published 2024-12-01“…End-to-End Encryption (E2EE) plays an essential role in safeguarding user privacy and protecting sensitive data across various communication platforms, including messaging applications, email services, and Internet of Things (IoT) devices. …”
Get full text
Article -
12
A secure and efficient encryption system based on adaptive and machine learning for securing data in fog computing
Published 2025-04-01“…The effectiveness of the proposed system has been validated through a comprehensive set of experiments, including evaluations of Encryption Time, Decryption Time, Encryption Throughput, Decryption Throughput, and Histogram Analysis. …”
Get full text
Article -
13
HP_FLAP: homomorphic and polymorphic federated learning aggregation of parameters framework
Published 2025-06-01“…Homomorphic encryption allows the server to perform aggregation on encrypted parameters without decrypting them, ensuring that sensitive information is protected during the aggregation process. …”
Get full text
Article -
14
A Machine Learning-Based Ransomware Detection Method for Attackers’ Neutralization Techniques Using Format-Preserving Encryption
Published 2025-04-01“…Ransomware, a type of malware that first appeared in 1989, encrypts user files and demands money for decryption, causing increasing global damage. …”
Get full text
Article -
15
Data protection enhancement in smart grid communication: An efficient multi-layer encrypting approach based on chaotic techniques and steganography
Published 2024-12-01“…In this way, AES encryption suggests rapid processing with a short average time per each block; similarly, the decryption technique, which includes the dictionary and AES decryption also renders the results in a justified computational time nominating it as a practical approach. …”
Get full text
Article -
16
SoK: FHE-Friendly Symmetric Ciphers and Transciphering
Published 2025-06-01“… Fully Homomorphic Encryption (FHE) enables computation on encrypted data without decryption, demonstrating significant potential for privacy-preserving applications. …”
Get full text
Article -
17
GPU Acceleration for FHEW/TFHE Bootstrapping
Published 2024-12-01“… Fully Homomorphic Encryption (FHE) allows computations to be performed directly on encrypted data without decryption. …”
Get full text
Article -
18
Facial Privacy Protection with Dynamic Multi-User Access Control for Online Photo Platforms
Published 2025-03-01“…The results demonstrate the system’s effectiveness across all test scenarios, consistently performing face encryption operations in under 350 ms and achieving average face decryption times below 286 ms across various group sizes. …”
Get full text
Article -
19
Mitigating Transmission Errors: A Forward Error Correction-Based Framework for Enhancing Objective Video Quality
Published 2025-06-01“…This is achieved by combining H.264/AVC syntax-based encryption and decryption algorithms with error correction during the video coding process to provide end-to-end confidentiality. …”
Get full text
Article -
20
A Practical Implementation of Post-Quantum Cryptography for Secure Wireless Communication
Published 2025-06-01“…Therefore, PQC-based protocols with practical implementations across various applications are essential. This paper introduces a new framework for PQC standalone and PQC–AES (Advanced Encryption Standard) hybrid public-key encryption (PKE) protocols. …”
Get full text
Article