-
1
Encryption Algorithm MLOL: Security and Efficiency Enhancement Based on the LOL Framework
Published 2025-03-01“…In this paper, we present MLOL, a novel AEAD algorithm based on the LOL framework. MLOL combines authenticated encryption with optimizations to the LFSR structure to enhance both security and efficiency. …”
Get full text
Article -
2
Adaptive image encryption approach using an enhanced swarm intelligence algorithm
Published 2025-03-01“…The ICO-HO algorithm is utilized to optimize the parameters of PWLCM and PWCM chaotic maps to generate a secret key in the confusion and diffusion phases of image encryption. …”
Get full text
Article -
3
Color Image Encryption Based on Five-Dimensional Continuous Hyperchaotic System and Optimized Arnold Algorithm
Published 2025-06-01Subjects: Get full text
Article -
4
A compressed image encryption algorithm leveraging optimized 3D chaotic maps for secure image communication
Published 2025-04-01“…The proposed algorithm termed as OptiSecure-3D presents optimized parameter-based 3D chaotic maps for image encryption. …”
Get full text
Article -
5
A lightweight encryption algorithm for resource-constrained IoT devices using quantum and chaotic techniques with metaheuristic optimization
Published 2025-04-01“…This research introduces a novel lightweight encryption algorithm optimized with metaheuristic techniques, incorporating quantum encryption, confusion and diffusion operations, discrete wavelet transform (DWT), and multiple chaotic maps. …”
Get full text
Article -
6
Hardware implementation of RSA encryption algorithm based on pipeline
Published 2024-01-01“…To address the high cost of implementing long-bits RSA encryption algorithms in hardware, improvements have been made to the traditional radix-4 Montgomery algorithm. …”
Get full text
Article -
7
Crayfish optimization based pixel selection using block scrambling based encryption for secure cloud computing environment
Published 2025-01-01Subjects: Get full text
Article -
8
Analyzing cryptographic algorithm efficiency with in graph-based encryption models
Published 2025-07-01“…This research paper investigates the efficiency of cryptographic algorithms within graph-based encryption models such as star graph, focusing on their computational performance and security robustness. …”
Get full text
Article -
9
-
10
Revocation encryption scheme based on domestic cryptographic algorithm SM9
Published 2025-05-01“…To address the limitations of lengthy system public keys and inefficient decryption in existing identity-based revocation encryption schemes, an optimized revocation encryption scheme was proposed based on SM9, China’s independently developed identity-based cryptographic algorithm. …”
Get full text
Article -
11
Theoretical investigation of photonic spin Hall effect based on layered metastructure with graphene regulation by WOA for encoding and encryption
Published 2025-07-01Subjects: Get full text
Article -
12
Enhanced Homomorphic Encryption for Cloud Security Through Individual Optimization
Published 2025-01-01“…The study that has been suggested makes use of the technique of particle swarm optimization to achieve the goal of enhancing the encryption key. …”
Get full text
Article -
13
Enhancing Cloud Task Scheduling With a Robust Security Approach and Optimized Hybrid POA
Published 2023-01-01“…The hybrid optimization enables the proposed algorithm to provide efficient task scheduling by exploiting the strengths of entire algorithms. …”
Get full text
Article -
14
Optimized Video Watermarking With Entropy-Aware Block Selection and Modified Hénon-Map Encryption
Published 2024-01-01Get full text
Article -
15
A Practical Algorithm for Physical Layer Encryption Under Constant Envelope Constraint
Published 2025-01-01“…In this paper, we present a novel mask design algorithm that offers three key advantages compared to state-of-the-art methods: optimal Peak-to-Average Power Ratio (PAPR), applicability to both Gaussian and flat fading channels, and a high level of confidentiality. …”
Get full text
Article -
16
Evaluation of the Effectiveness of Lightweight Encryption Algorithms on Data Performance and Security on IoT Devices
Published 2025-06-01“…This research contributes a comparative framework to guide the selection of encryption algorithms for IoT systems, ensuring an optimal trade-off between security and operational efficiency.…”
Get full text
Article -
17
Efficient implementation for BFV fully homomorphic encryption algorithm based on Zynq platform
Published 2024-09-01“…An efficient implementation scheme for the BFV fully homomorphic encryption algorithm was proposed on the Zynq platform. …”
Get full text
Article -
18
A New Image Encryption Method Using an Optimized Smart Codebook
Published 2025-01-01Get full text
Article -
19
Joint Encryption and Optimization for 6G MEC-Enabled IoT Networks
Published 2025-01-01“…An optimization algorithm is introduced to address these challenges by jointly allocating resources, thereby optimizing throughput, conserving energy, and meeting latency benchmarks through dynamic system adaptation. …”
Get full text
Article -
20
Blockchain Enabled Secure Medical Data Transmission and Diagnosis Using Golden Jackal Optimization Algorithm with Deep Learning
Published 2024-10-01“…Also, BC is implemented to store the encrypted imageries. Next, the diagnostic method includes Bayesian optimization algorithm (BOA) based hyper parameter tuning, deep belief network (DBN)-based classification, and CapsNet-based feature extraction. …”
Get full text
Article