Showing 101 - 120 results of 187 for search 'optimal encryption algorithm', query time: 0.11s Refine Results
  1. 101

    Differential analysis of lightweight cipher algorithm ACE based on MILP by Shuai LIU, Jie GUAN, Bin HU, Sudong MA

    Published 2023-01-01
    “…The differential property of the lightweight cipher algorithm ACE was researched.n-dimension ring AND-gate combination was defined and its differential property was described accurately by only O(n) expressions with the MILP method by analyzing the relationship among AND gates.The nonlinear operation of ACE was transformed to the 32-dimension ring AND-gate combination and the MILP differential model of ACE was proposed.According to the characteristics of Gurobi solver, a model for fast solving the MILP differential model of ACE was given.For ACE permutation with 3 to 6 steps, the optimal differential characteristic was obtained and its probability was improved by multi-difference technique.The differential forge attack on authenticated encryption algorithm ACE-<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mi mathvariant="script">A</mi><mi mathvariant="script">E</mi></math></inline-formula>-128 and the differential collision attack on hash algorithm ACE-<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mi mathvariant="script">H</mi></math></inline-formula>-256 was given with 3-step ACE permutation, and the success probability was 2<sup>-90.52</sup>.And it was proved that the 4-steps ACE permutation arrived the differential security bound of 128 bit.Actually, the MILP differential description of ring AND-gate combination can be applied on more cipher algorithms, such as SIMON, Simeck.…”
    Get full text
    Article
  2. 102
  3. 103

    WiFi Indoor Positioning Based on EGA-PF and Fernet Algorithm by Yanchun Wang, Shaoye Sun, Fengjuan Miao, Ying Xia

    Published 2025-01-01
    “…In this regard, the random sampling and resampling techniques of the particle filtering (PF) algorithm are utilized for secondary optimization of the selection of the GA. …”
    Get full text
    Article
  4. 104

    Network Efficient Hierarchical Authentication Algorithm for Secure Communication in IoT and IoE by Abhiram Sharma, R. Suganya, P. B. Krishna, Rudra Raj, Raja Kumar Murugesan

    Published 2024-01-01
    “…The algorithm outperforms traditional encryption algorithms by excelling in scalability, handling large datasets efficiently through its hierarchical encryption framework. …”
    Get full text
    Article
  5. 105

    Privacy protection risk identification mechanism based on automated feature combination by CAI Minchao, YAO Hongwei, WANG Yang, QIN Zhan, CHEN Shaomeng, REN Kui

    Published 2024-11-01
    “…This algorithm enhanced computational efficiency in feature combination optimization by 99.93%. …”
    Get full text
    Article
  6. 106

    Comprehensive Analysis of Lightweight Cryptographic Algorithms for Battery-Limited Internet of Things Devices by Nahom Gebeyehu Zinabu, Yihenew Wondie Marye, Kula Kekeba Tune, Samuel Asferaw Demilew

    Published 2025-01-01
    “…Among the main trends that were covered were the trade-offs between resource limitations and security strength, hardware–software co-optimization, block and stream cipher optimization, and hybrid encryption techniques. …”
    Get full text
    Article
  7. 107

    Development and investigation of parallel model of bee colony algorithms for cryptanalysis problem solving by Yury O Chernyshev, Alexander S Sergeev, Alexander N Ryazanov, Evgeny O. Dubrov

    Published 2017-03-01
    “…It should be noted (and it was observed in the previous works) that the distinctive feature of applying the bioinspired meth-ods of cryptanalysis is the applicability of the encryption-decryption algorithm as a criterion function for the evaluation of the key ac-ceptability defined by the bioinspired method operations. …”
    Get full text
    Article
  8. 108

    Research on Digital Image Watermarking Algorithm Based on Scrambling and Singular Value Decomposition by Lei Pei

    Published 2022-01-01
    “…The transmittance of the degraded image is calculated, the transmittance is refined by relying on the soft matting algorithm and guiding filter, the image contrast in the image frequency domain is enhanced, and the results are mapped to the appropriate visual range to optimize the visual brightness of the image. …”
    Get full text
    Article
  9. 109

    Secure K-Means Clustering Scheme for Confidential Data Based on Paillier Cryptosystem by Zhengqi Zhang, Zixin Xiong, Jun Ye

    Published 2025-06-01
    “…Although this protocol solves the key problems of secure distance computation, cluster assignment and centroid update, there are still areas for further research. These include optimizing the computational efficiency of the protocol, exploring other homomorphic encryption schemes that may provide better performance, and extending the protocol to handle more complex clustering algorithms.…”
    Get full text
    Article
  10. 110

    Cyber-Secure IoT and Machine Learning Framework for Optimal Emergency Ambulance Allocation by Jonghyuk Kim, Sewoong Hwang

    Published 2025-06-01
    “…Optimizing ambulance deployment is a critical task in emergency medical services (EMS), as it directly affects patient outcomes and system efficiency. …”
    Get full text
    Article
  11. 111

    Security decision method for the edge of multi-layer satellite network based on reinforcement learning by Peiliang ZUO, Shaolong HOU, Chao GUO, Hua JIANG, Wenbo WANG

    Published 2022-06-01
    “…Specifically, the edge center node obtains the environmental state of the satellite network through the perception system, and on this basis, uses the ability of deep reinforcement learning algorithm to learn independently, and obtains the optimal data offloading strategy in the scene by fitting, and obtains the optimal link planning., so that the onboard resources can be fully utilized, so as to achieve the goal of minimizing the average return delay of many observation tasks.First,the edge center node observes the environment and obtains state elements such as the data volume, channel conditions, and edge node processing capability of the observation satellite mission in the environment. …”
    Get full text
    Article
  12. 112

    VLSI implementation of AES algorithm against differential power attack and differential fault attack by HAN Jun, ZENG Xiao-yang, ZHAO Jia

    Published 2010-01-01
    “…A VLSI implementation of AES algorithm against both differential power attack and differential fault attack was proposed. …”
    Get full text
    Article
  13. 113

    Stochastic job stream scheduling method for cipher chip with multi-cryptography by Li LI, Guo-zhen SHI, Kui GENG, Xiu-ze DONG, Xuan WANG, Feng-hua LI

    Published 2016-12-01
    “…Aiming at the rich of safety requirements of tasks which resulting in random cross access to multi cipher algorithms, a hierarchical hardware scheduling method was presented with associated control based on data identifica-tion. …”
    Get full text
    Article
  14. 114

    Mathematical Background and Algorithms of a Collection of Android Apps for a Google Play Store Page by Roland Szabo

    Published 2025-04-01
    “…The second application suggests a secure file management system for Android, utilizing encryption and access control algorithms to safeguard user privacy. …”
    Get full text
    Article
  15. 115

    A privacy preserving machine learning framework for medical image analysis using quantized fully connected neural networks with TFHE based inference by Sadhana Selvakumar, B. Senthilkumar

    Published 2025-07-01
    “…The FCNN model is trained in a plaintext environment for FHE compatibility using Quantization-Aware Training to optimize weights and activations. The quantized FCNN model is then validated under FHE constraints through simulation and compiled into an FHE-compatible circuit for encrypted inference on sensitive data. …”
    Get full text
    Article
  16. 116

    Efficient and Composable Masked AES S-Box Designs Using Optimized Inverters by Vedad Hadžic, Roderick Bloem

    Published 2024-12-01
    “… Hardware implementations of cryptographic algorithms are susceptible to power analysis attacks, allowing attackers to break the otherwise strong security guarantees. …”
    Get full text
    Article
  17. 117

    Secure bio-inspired optimization with intrusion aware on-demand routing in MANETs by N. Naveen, J. Nirmaladevi

    Published 2025-07-01
    “…The proposed methodology is built upon the conventional AODV protocol which uses bio-inspired Elephant Herding Optimization algorithm. Here, Trust Value (TV) which is the important security measure is considered as the fundamental parameter of route selection. …”
    Get full text
    Article
  18. 118

    High-Performance Number Theoretic Transform on GPU Through radix2-CT and 4-Step Algorithms by Alisah Ozcan, Arsalan Javeed, Erkay Savas

    Published 2025-01-01
    “…To this end, our algorithms leverage novel strategy to optimize memory access patterns adaptive to input size, which often is very large. …”
    Get full text
    Article
  19. 119

    Design Optimization of Parameters for Resolver Software Decoding Based on Surrogate Model Management by DENG Yu, LING Yuelun, WU Zuolai, PENG Zaiwu, WANG Jun

    Published 2025-06-01
    “…Next, a surrogate model was constructed for the software decoding system, using the Latin hypercube design (LHD) method and based on a radial basis function. Finally, a genetic algorithm (GA) was utilized to optimize parameters in the resolver software decoding system through a solving process, and a partial encryption method was introduced to iteratively update the surrogate model, yielding a partially optimal solution that meets the error requirements. …”
    Get full text
    Article
  20. 120