Showing 1 - 20 results of 187 for search 'optimal encryption algorithm', query time: 0.12s Refine Results
  1. 1

    Encryption Algorithm MLOL: Security and Efficiency Enhancement Based on the LOL Framework by Xinyue Zhang, Daoguang Mu, Wenzheng Zhang, Xinfeng Dong

    Published 2025-03-01
    “…In this paper, we present MLOL, a novel AEAD algorithm based on the LOL framework. MLOL combines authenticated encryption with optimizations to the LFSR structure to enhance both security and efficiency. …”
    Get full text
    Article
  2. 2

    Adaptive image encryption approach using an enhanced swarm intelligence algorithm by Sachin Minocha, Suvita Rani Sharma, Birmohan Singh, Amir H. Gandomi

    Published 2025-03-01
    “…The ICO-HO algorithm is utilized to optimize the parameters of PWLCM and PWCM chaotic maps to generate a secret key in the confusion and diffusion phases of image encryption. …”
    Get full text
    Article
  3. 3
  4. 4

    A compressed image encryption algorithm leveraging optimized 3D chaotic maps for secure image communication by Akshat Tiwari, Prachi Diwan, Tarun Dhar Diwan, Mahdal Miroslav, S. P. Samal

    Published 2025-04-01
    “…The proposed algorithm termed as OptiSecure-3D presents optimized parameter-based 3D chaotic maps for image encryption. …”
    Get full text
    Article
  5. 5

    A lightweight encryption algorithm for resource-constrained IoT devices using quantum and chaotic techniques with metaheuristic optimization by Amer Aljaedi, Adel R. Alharbi, Abdullah Aljuhni, Moahd K. Alghuson, Shafi Alassmi, Arslan Shafique

    Published 2025-04-01
    “…This research introduces a novel lightweight encryption algorithm optimized with metaheuristic techniques, incorporating quantum encryption, confusion and diffusion operations, discrete wavelet transform (DWT), and multiple chaotic maps. …”
    Get full text
    Article
  6. 6

    Hardware implementation of RSA encryption algorithm based on pipeline by Yang Longfei, Lu Shi, Peng Kuang

    Published 2024-01-01
    “…To address the high cost of implementing long-bits RSA encryption algorithms in hardware, improvements have been made to the traditional radix-4 Montgomery algorithm. …”
    Get full text
    Article
  7. 7
  8. 8

    Analyzing cryptographic algorithm efficiency with in graph-based encryption models by Yashmin Banu, Biplab Kumar Rath, Debasis Gountia

    Published 2025-07-01
    “…This research paper investigates the efficiency of cryptographic algorithms within graph-based encryption models such as star graph, focusing on their computational performance and security robustness. …”
    Get full text
    Article
  9. 9
  10. 10

    Revocation encryption scheme based on domestic cryptographic algorithm SM9 by XIE Zhenjie, ZHANG Wanli, ZHANG Yao, ZHAO Fangfang, LIU Shengli

    Published 2025-05-01
    “…To address the limitations of lengthy system public keys and inefficient decryption in existing identity-based revocation encryption schemes, an optimized revocation encryption scheme was proposed based on SM9, China’s independently developed identity-based cryptographic algorithm. …”
    Get full text
    Article
  11. 11
  12. 12

    Enhanced Homomorphic Encryption for Cloud Security Through Individual Optimization by Radha Marepalli, Sunitha Vanamala, Manoj Kumar Konda, Venkata Rama Lakshmi Gundala, Prasanthi B.

    Published 2025-01-01
    “…The study that has been suggested makes use of the technique of particle swarm optimization to achieve the goal of enhancing the encryption key. …”
    Get full text
    Article
  13. 13

    Enhancing Cloud Task Scheduling With a Robust Security Approach and Optimized Hybrid POA by S. V. Aswin Kumer, N. Prabakaran, E. Mohan, Balaji Natarajan, G. Sambasivam, Vaibhav Bhushan Tyagi

    Published 2023-01-01
    “…The hybrid optimization enables the proposed algorithm to provide efficient task scheduling by exploiting the strengths of entire algorithms. …”
    Get full text
    Article
  14. 14
  15. 15

    A Practical Algorithm for Physical Layer Encryption Under Constant Envelope Constraint by Clement Leroy, Tarak Arbi, Oudomsack Pierre Pasquero, Benoit Geller

    Published 2025-01-01
    “…In this paper, we present a novel mask design algorithm that offers three key advantages compared to state-of-the-art methods: optimal Peak-to-Average Power Ratio (PAPR), applicability to both Gaussian and flat fading channels, and a high level of confidentiality. …”
    Get full text
    Article
  16. 16

    Evaluation of the Effectiveness of Lightweight Encryption Algorithms on Data Performance and Security on IoT Devices by Damar Indrajati, Wahid Miftahul Ashari

    Published 2025-06-01
    “…This research contributes a comparative framework to guide the selection of encryption algorithms for IoT systems, ensuring an optimal trade-off between security and operational efficiency.…”
    Get full text
    Article
  17. 17

    Efficient implementation for BFV fully homomorphic encryption algorithm based on Zynq platform by YANG Yatao, CAO Jingpei, CHEN Liangyu, WANG Wei

    Published 2024-09-01
    “…An efficient implementation scheme for the BFV fully homomorphic encryption algorithm was proposed on the Zynq platform. …”
    Get full text
    Article
  18. 18
  19. 19

    Joint Encryption and Optimization for 6G MEC-Enabled IoT Networks by Manzoor Ahmed, Wali Ullah Khan, Fatma S. Alrayes, Yahia Said, Ali M. Al-Sharafi, Mi-Hye Kim, Khongorzul Dashdondov, Inam Ullah

    Published 2025-01-01
    “…An optimization algorithm is introduced to address these challenges by jointly allocating resources, thereby optimizing throughput, conserving energy, and meeting latency benchmarks through dynamic system adaptation. …”
    Get full text
    Article
  20. 20

    Blockchain Enabled Secure Medical Data Transmission and Diagnosis Using Golden Jackal Optimization Algorithm with Deep Learning by Kiruthikadevi Kulandaivelu, Sivaraj Rajappan, Vijayakumar Murugasamy

    Published 2024-10-01
    “…Also, BC is implemented to store the encrypted imageries. Next, the diagnostic method includes Bayesian optimization algorithm (BOA) based hyper parameter tuning, deep belief network (DBN)-based classification, and CapsNet-based feature extraction. …”
    Get full text
    Article