Showing 21 - 40 results of 187 for search 'optimal encryption algorithm', query time: 0.08s Refine Results
  1. 21
  2. 22
  3. 23
  4. 24

    A Lightweight Symmetric DNA Encryption Algorithm Inspired by Protein Synthesis (SDEAP) for IoT Devices by DJAA, D., MEKKAOUI, K., BOUKLI-HACENE, S.

    Published 2025-02-01
    “…In this paper, a new lightweight symmetric DNA encryption algorithm inspired by protein synthesis (SDEAP) is proposed. …”
    Get full text
    Article
  5. 25

    A new method for decoding an encrypted text by genetic algorithms and its comparison with tabu search and simulated annealing by Mahdi Sadeghzadeh, Mahsa Taherbaghal

    Published 2014-02-01
    “…Genetic Algorithm is an algorithm based on population and many optimization problems are solved with this method, successfully. …”
    Get full text
    Article
  6. 26
  7. 27

    A Novel Color Image Encryption Algorithm Based on Hybrid Two-Dimensional Hyperchaos and Genetic Recombination by Yaoqun Xu, Jiaoyang Liu, Zelong You, Tianqi Zhang

    Published 2024-11-01
    “…The color picture encryption algorithm utilizing chaotic mapping is limited by a small chaotic range, unstable chaotic state, and lengthy encryption duration. …”
    Get full text
    Article
  8. 28

    Compressive sensing and DNA coding operation: Revolutionary approach to colour medical image compression‐encryption algorithm by Xianglian Xue, Haiyan Jin, Changjun Zhou

    Published 2024-12-01
    “…Finally, the regrouped bit planes help yield the compressed encrypted images. A comprehensive analysis of the proposed algorithm's encryption and decryption effectiveness, compression performance, and security was conducted. …”
    Get full text
    Article
  9. 29

    Enhancing smart healthcare networks: Integrating attribute-based encryption for optimization and anti-corruption mechanisms by Yanzhao Zeng, Xin Guan, Jingjing Sun, Yanrui Chen, Zeyu Wang, Peng Nie

    Published 2025-01-01
    “…The ABE approach is then empirically compared to other prominent encryption algorithms, such as Identity-Based Encryption, Data Encryption Standard, Advanced Encryption Standard, and Rivest-Shamir-Adleman algorithms. …”
    Get full text
    Article
  10. 30

    Optimization method for attribute-based cryptographic access control in mobile cloud computing by Jian LIU, Ming XIAN, Huimei WANG, Hong RONG

    Published 2018-07-01
    “…For the problem of secure data sharing and access control in mobile cloud,the drawback of traditional cryptographic access control schemes was deeply analyzed.Considering the truth that mobile devices were usually equipped with limited resources,an optimized attribute-based cryptographic access control scheme was proposed in this study.In the proposed scheme,a third party proxy was introduced into the system model,and the two-layer encryption method was applied.Combining traditional attribute-based encryption (ABE) algorithm with multi-secret sharing and split measurement of ABE encryption,the scheme could greatly reduce the cost of mobile users in terms of data publish and access management.Theoretical and experimental analysis shows that the contribution can well meet the requirements of mobile cloud in terms of security,computational complexity and communication cost,which means that it is promising for future applications.…”
    Get full text
    Article
  11. 31

    Implementing semiclassical Szegedy walks in classical-quantum circuits for homomorphic encryption by Sergio A Ortega, Pablo Fernández, Miguel A Martin-Delgado

    Published 2025-01-01
    “…This work delves into quantum homomorphic encryption (QHE), an emerging technology that facilitates secure computation on encrypted quantum data without revealing the underlying information. …”
    Get full text
    Article
  12. 32

    Adaptive encryption method of sensitive data in data center database based on big data cross-mapping fusion algorithm by Dingwen Zhang, Shuang Yang, Ming Chen, Lei Zheng, Jiashu Fan, Aidi Dong

    Published 2025-08-01
    “…This approach transforms the serial operation structure of the AES algorithm into a parallel operation structure, enabling adaptive encryption of fusion sensitive data. …”
    Get full text
    Article
  13. 33

    Securing Electrical Drive Systems Against Man-in-the-Middle Attacks Using S-Box Optimized AES Encryption by J. Dheeba, Vansh Oberoi, R. Raja Singh, V. Gautam Karthik

    Published 2025-01-01
    “…The optimized S-box is generated using the Differential Evolution (DE) algorithm for encrypting data within the communication network to mitigate data visibility. …”
    Get full text
    Article
  14. 34

    A high-entropy image encryption scheme using optimized chaotic maps with Josephus permutation strategy by Nawal El Ghouate, Mohamed Amine Tahiri, Ahmed Bencherqui, Hanaa Mansouri, Ahmed El Maloufy, Hicham Karmouni, Mhamed Sayyouri, Sameh Askar, Mohamed Abouhawwash

    Published 2025-08-01
    “…We suggest a novel image encryption algorithm based on chaotic maps and the variable-step Josephus problem to get over these restrictions and increase the encryption resilience. …”
    Get full text
    Article
  15. 35

    Square-Based Division Scheme for Image Encryption Using Generalized Fibonacci Matrices by Panagiotis Oikonomou, George K. Kranas, Maria Sapounaki, Georgios Spathoulas, Aikaterini Aretaki, Athanasios Kakarountas, Maria Adam

    Published 2025-05-01
    “…This paper proposes a novel image encryption and decryption scheme, called Square Block Division-Fibonacci (SBD-Fibonacci), which dynamically partitions any input image into optimally sized square blocks to enable efficient encryption without resizing or distortion. …”
    Get full text
    Article
  16. 36

    A New Approach Combining RSA and ElGamal Algorithms: Advancements in Encryption and Digital Signatures Using Gaussian Integers by Yahia Awad, Douaa Jomaa, Yousuf Alkhezi, Ramiz Hindi

    Published 2025-03-01
    “…This article introduces a novel approach that integrates the ElGamal and RSA algorithms to advance the security and efficiency of public-key cryptosystems. …”
    Get full text
    Article
  17. 37

    Security-Enhanced Image Encryption: Combination of S-Boxes and Hyperchaotic Integrated Systems by Renjie Song, Haixia Zhao

    Published 2025-01-01
    “…A three-step diffusion mechanism is adopted in the encryption process, and the S-boxes obtained from the search of the particle swarm optimization algorithm are fully integrated with the chaotic sequences generated by the hyperchaotic integrated system in the first two steps of diffusion to improve the security and randomness of the encryption algorithm. …”
    Get full text
    Article
  18. 38

    Convolutional neural network model over encrypted data based on functional encryption by Chen WANG, Jiarun LI, Jian XU

    Published 2024-03-01
    “…Currently, homomorphic encryption, secure multi-party computation, and other encryption schemes are used to protect the privacy of sensitive data in outsourced convolutional neural network (CNN) models.However, the computational and communication overhead caused by the above schemes would reduce system efficiency.Based on the low cost of functional encryption, a new convolutional neural network model over encrypted data was constructed using functional encryption.Firstly, two algorithms based on functional encryption were designed, including inner product functional encryption and basic operation functional encryption algorithms to implement basic operations such as inner product, multiplication, and subtraction over encrypted data, reducing computational and communication costs.Secondly, a secure convolutional computation protocol and a secure loss optimization protocol were designed for each of these basic operations, which achieved ciphertext forward propagation in the convolutional layer and ciphertext backward propagation in the output layer.Finally, a secure training and classification method for the model was provided by the above secure protocols in a module-composable way, which could simultaneously protect the confidentiality of user data as well as data labels.Theoretical analysis and experimental results indicate that the proposed model can achieve CNN training and classification over encrypted data while ensuring accuracy and security.…”
    Get full text
    Article
  19. 39

    Hybrid blowfish cryptography with elliptic curve Diffie-Hellman key exchange protocol for enhancing data security and performance by K. Vignesh Saravanan, G. Sakthi Priya

    Published 2025-05-01
    “…The implementation was carried out using MATLAB tool, ensuring reliable evaluation of encryption and decryption performance. The research work ensures optimal performance at a rate of 28.57% and also improved security standard of 33.33% compared to the traditional algorithms.…”
    Get full text
    Article
  20. 40

    Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage by ZHANG Kejun, WANG Wenbin, XU Shaofei, YU Xinying, WANG Jun, LI Pengcheng, QIAN Rong

    Published 2024-09-01
    “…The access tree was enhanced with node information for fine-grained control over ciphertext read and write permissions. The keyword encryption process was optimized for trapdoor indistinguishability and restricted user search capabilities. …”
    Get full text
    Article